{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:47:48Z","timestamp":1777128468357,"version":"3.51.4"},"reference-count":160,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1219570"],"award-info":[{"award-number":["CNS-1219570"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2017,10,1]]},"DOI":"10.1109\/tetc.2016.2606384","type":"journal-article","created":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T18:24:09Z","timestamp":1473272649000},"page":"586-602","source":"Crossref","is-referenced-by-count":595,"title":["A Comprehensive Study of Security of Internet-of-Things"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9463-4343","authenticated-orcid":false,"given":"Arsalan","family":"Mosenia","sequence":"first","affiliation":[]},{"given":"Niraj K.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"104","author":"becher","year":"0","journal-title":"Proc 3rd Inte Conf Secur Pervasive Comput"},{"key":"ref38","first-page":"489","article-title":"Search-based physical attacks in sensor networks","author":"wang","year":"0","journal-title":"Proc IEEE 14th Int Conf Comput Commun Netw"},{"key":"ref33","first-page":"145","article-title":"Preventing DoS attacks in wireless sensor networks: A repeated game theory approach","volume":"5","author":"agah","year":"2007","journal-title":"Int J Netw Secur"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2163881"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"ref30","first-page":"195","article-title":"Authenticated and efficient key management for wireless ad-hoc networks","author":"seys","year":"0","journal-title":"Proc 24th Benelux Symp Information Theory"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref36","article-title":"Stuxnet under the microscope","author":"matrosov","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2478003"},{"key":"ref27","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5826"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520910"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2818362.2818364"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883404"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_13"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2008.4806536"},{"key":"ref25","year":"0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/11872153_14"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_24"},{"key":"ref154","year":"0"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2011.11.049"},{"key":"ref155","year":"2016"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516696"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185564"},{"key":"ref151","doi-asserted-by":"crossref","DOI":"10.31979\/etd.57bu-ndpx","article-title":"Intrusion detection and prevention system: SQL-injection attacks","author":"luong","year":"2010"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21557-5_37"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2344095"},{"key":"ref59","first-page":"100","article-title":"Eavesdropping attacks on high-frequency RFID tokens","author":"hancke","year":"0","journal-title":"The 4th Workshop on RFID Security"},{"key":"ref58","first-page":"159","article-title":"RFID systems: A survey on security threats and proposed solutions","author":"peris-lopez","year":"0","journal-title":"Wireless Pers Commun"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref56","article-title":"DHS emerging applications and technology subcommittee.","author":"karygiannis","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-98"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.014"},{"key":"ref53","first-page":"291","article-title":"Hacking the prox card","author":"westhues","year":"2005","journal-title":"RFID Applications Security and Privacy"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_20"},{"key":"ref40","first-page":"1","article-title":"Tamper resistance-a cautionary note","volume":"2","author":"anderson","year":"0","journal-title":"Proc 2nd Usenix Workshop Electron Commerce"},{"key":"ref160","article-title":"Electromagnetic side channel analysis of a contactless smart card: First results","author":"carluccio","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref3","first-page":"257","article-title":"R. Khan, S. U. Khan, R. Zaheer, and S. Khan, &#x201C;Future internet: The Internet of Things architecture, possible applications and key challenges","year":"0","journal-title":"Proc IEEE 10th Int Conf Frontiers Inf Technol"},{"key":"ref6","first-page":"203","article-title":"Emerging frontiers in embedded security","author":"mozaffari-kermani","year":"0","journal-title":"Proc IEEE Int Conf VLSI Des"},{"key":"ref5","article-title":"The Internet of Things reference model","year":"2014"},{"key":"ref159","first-page":"9","article-title":"TouchLogger: Inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"0","journal-title":"Proc Usenix Workshop Hot Topics in Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2569472"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2494021"},{"key":"ref157","first-page":"785","article-title":"Powerspy: Location tracking using mobile device power analysis","author":"michalevsky","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref158","first-page":"1","article-title":"Accomplice: Location inference using accelerometers on smartphones","author":"han","year":"0","journal-title":"Proc IEEE Int Conf Commun Syst Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICECC.2011.6066743"},{"key":"ref46","first-page":"1","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","volume":"4","author":"padmavathi","year":"2009","journal-title":"Int J Comput Sci"},{"key":"ref45","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"0","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"ref42","article-title":"Smart Nest thermostat: A smart spy in your home","author":"hernandez","year":"0","journal-title":"Proc Black Hat USA"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675777"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1201\/9780849379253-20","article-title":"Wireless sensor network security: A survey","volume":"1","author":"walters","year":"2007","journal-title":"Security in Distributed Grid and Pervasive Computing"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38004-4_14"},{"key":"ref124","article-title":"Ultra-lightweight mutual authentication and ownership transfer protocol with PUF for Gen2 V2 RFID systems","volume":"2","author":"huang","year":"0","journal-title":"Proc Int Conf Eng Comput Sci"},{"key":"ref73","first-page":"1","article-title":"The fog computing paradigm: Scenarios and security issues","author":"stojmenovic","year":"0","journal-title":"Proc IEEE Federated Conf Comput Sci Inf Syst"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref71","first-page":"23","article-title":"Hello flood attack and its countermeasures in wireless sensor networks","volume":"7","author":"singh","year":"2010","journal-title":"Int J Comput Sci"},{"key":"ref128","first-page":"193","article-title":"Secure routing for mobile ad hoc networks","author":"papadimitratos","year":"0","journal-title":"Proc SCS Commun Netw Distrib Syst Model Simul Conf"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TMC.2007.250674","article-title":"Wormhole-based antijamming techniques in sensor networks","volume":"6","author":"?agalj","year":"2007","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref77","first-page":"1807","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proc 29th Int Conf Mach Learn"},{"key":"ref74","article-title":"An overview of fog computing and its security issues","author":"stojmenovic","year":"2015","journal-title":"J Concurrency Practice and Experience"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_21"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2004.1342330"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1639562.1639592"},{"key":"ref136","author":"daemen","year":"2013","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"ref138","first-page":"7","article-title":"Lightweight cryptography for the Internet of Things","author":"katagi","year":"2008","journal-title":"Sony Corporation"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"ref60","first-page":"1","article-title":"Side-Channel attacks: Ten years after its publication and the impacts on cryptographic module security testing","volume":"2005","author":"zhou","year":"2005","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref139","first-page":"181","article-title":"The 128-bit blockcipher CLEFIA","author":"shirai","year":"0","journal-title":"Proc Fast Softw Encryption"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2466548"},{"key":"ref63","first-page":"628","article-title":"Security attacks and countermeasures for wireless sensor networks: Survey","author":"sarhana","year":"2013","journal-title":"International Journal of Current Engineering and Technology"},{"key":"ref64","first-page":"60","article-title":"DEEJAM: Defeating energy-efficient jamming in IEEE 802.15. 4-based wireless networks","author":"wood","year":"0","journal-title":"Proc IEEE 4th Commun Soc Conf Sensor Mesh Ad-Hoc Commun Netw"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2013.166"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.013"},{"key":"ref67","first-page":"20","article-title":"Using REWARD to detect team black-hole attacks in wireless sensor networks","author":"karakehayov","year":"0","journal-title":"Proc Workshop Real-World Wireless Sensor Netw"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref68","first-page":"205","article-title":"A survey of cooperative black and gray hole attack in MANET","volume":"1","author":"revathi","year":"2012","journal-title":"Int J Comput Sci Manage Res"},{"key":"ref144","author":"howard","year":"2009","journal-title":"The Security Development Lifecycle"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref69","article-title":"Security considerations in the IP-based Internet of Things.","author":"garcia-morchon","year":"0"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2007.03.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"ref109","first-page":"2007","article-title":"Low-cost RFID privacy protection scheme","volume":"45","author":"kinoshita","year":"2004","journal-title":"IPSJ J"},{"key":"ref95","first-page":"1927","article-title":"The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks]","volume":"4","author":"su","year":"2005","journal-title":"IEEE Wireless Commun and Net Conf"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029181"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290173"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smart cards","author":"quisquater","year":"2001","journal-title":"Smart Card Programming and Security"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/685219"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/EDSSC.2015.7285146"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2015.7059101"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_18"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513103"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.2200\/S00622ED1V01Y201412SPT012"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_16"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2000502.2000503"},{"key":"ref96","first-page":"343","article-title":"Intrusion detection in sensor networks: A non-cooperative game approach","author":"agah","year":"0","journal-title":"Proc IEEE International Symp Netw Comput Appl"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2013.2243032"},{"key":"ref11","first-page":"125","article-title":"What is the Internet of Things? An economic perspective","author":"fleisch","year":"2010","journal-title":"Economics Management and Financial Markets"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pursup.2007.11.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2322103"},{"key":"ref14","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"0","journal-title":"Proc IEEE 13th Int Conf e-Health Netw Appl Serv"},{"key":"ref15","first-page":"129","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"0","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"ref16","first-page":"546","article-title":"A reference model of information assurance & security","author":"cherdantseva","year":"0","journal-title":"Proc IEEE Int Conf Availab Rel Secur"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2014.01.003"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/11424758_65"},{"key":"ref17","author":"parker","year":"1983","journal-title":"Fighting Computer Crime"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ref18","author":"whitman","year":"2011","journal-title":"Principles of Information Security"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"ref119","first-page":"719","article-title":"Hash-chain based forward-secure privacy protection scheme for low-cost RFID","volume":"2004","author":"ohkubo","year":"0","journal-title":"Proc Scandinavian Conf Inf Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855579"},{"key":"ref114","first-page":"32","article-title":"8-bit microcontroller system with area efficient AES coprocessor for transponder applications","author":"jung","year":"0","journal-title":"Proc Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/11833529_93"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2491266.2491270"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/11596042_97"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_18"},{"key":"ref121","article-title":"Lightweight authentication protocols for low-cost RFID tags","author":"vajda","year":"0","journal-title":"Proc Workshop Security in Ubiquitous Computing"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2010.5529941"},{"key":"ref123","article-title":"PUF-based RFID authentication secure and private under complete memory leakage","author":"moriyama","year":"2013","journal-title":"Int Assoc Cryptologic Res Cryptology ePrint Archive"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00816-5_3"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.263"},{"key":"ref88","first-page":"9","article-title":"WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices","author":"clark","year":"0","journal-title":"Proc USENIX Workshop Health Inf Technol"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/6245516\/8128656\/7562568-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/8128656\/07562568.pdf?arnumber=7562568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:24Z","timestamp":1649444004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7562568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":160,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2016.2606384","relation":{},"ISSN":["2168-6750"],"issn-type":[{"value":"2168-6750","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}