{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:19:51Z","timestamp":1774023591460,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tii.2022.3156647","type":"journal-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T20:51:35Z","timestamp":1646686295000},"page":"8674-8681","source":"Crossref","is-referenced-by-count":6,"title":["Secure Industrial IoT Task Containerization With Deadline Constraint: A Stackelberg Game Approach"],"prefix":"10.1109","volume":"18","author":[{"given":"Chitranjan","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5907-7665","authenticated-orcid":false,"given":"Preti","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0976-6737","authenticated-orcid":false,"given":"Rahul","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3207-1340","authenticated-orcid":false,"given":"Hari Prabhat","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2801-0687","authenticated-orcid":false,"given":"Tanima","family":"Dutta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology (BHU), Varanasi, India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00169"},{"key":"ref11","first-page":"1423","article-title":"Security namespace: Making linux security frameworks available to containers","author":"sun","year":"0","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027700"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.3009903"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC-CSS.2016.018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427236"},{"key":"ref16","first-page":"186","article-title":"ZeroDVS: Trace-ability and security detection of container image based on inheritance graph","author":"zheng","year":"0","journal-title":"Proc IEEE 5th Int Conf Cryptography Secur Privacy"},{"key":"ref17","first-page":"491","article-title":"On the relation between outdated docker containers, severity vulnerabilities, and bugs","author":"zerouali","year":"0","journal-title":"Proc IEEE 26th Int Conf Softw Anal Evol Reengin"},{"key":"ref18","first-page":"1","article-title":"DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous cluster","author":"mao","year":"0","journal-title":"Proc IEEE 36th Int Perform Comput Commun Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2996304"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966069"},{"key":"ref28","article-title":"Vehicle driving behavior","author":"zhang","year":"2021"},{"key":"ref3","article-title":"Understanding Virtualization for Industrial Automation: Mike Fahrion","year":"2021"},{"key":"ref27","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047416"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022843"},{"key":"ref29","article-title":"Driver behavior dataset","author":"yuksel","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084753"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3133614"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3125070"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084341"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2714638"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052082"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"6242","DOI":"10.1109\/TITS.2020.2990462","article-title":"Task-container matching game for computation offloading in vehicular edge computing and networks","volume":"22","author":"huang","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref24","author":"taub","year":"1986","journal-title":"Principles of Communication Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3059447"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3015546"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2141667"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9906876\/09729488.pdf?arnumber=9729488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:09:08Z","timestamp":1667524148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9729488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":29,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3156647","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}