{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:49:35Z","timestamp":1771703375436,"version":"3.50.1"},"reference-count":120,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Sustain. Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tsusc.2024.3443256","type":"journal-article","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T17:42:23Z","timestamp":1723657343000},"page":"345-365","source":"Crossref","is-referenced-by-count":25,"title":["Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5071-5803","authenticated-orcid":false,"given":"Amirmohammad","family":"Pasdar","sequence":"first","affiliation":[{"name":"School of Systems &#x0026; Computing, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8831-632X","authenticated-orcid":false,"given":"Nickolaos","family":"Koroniotis","sequence":"additional","affiliation":[{"name":"School of Systems &#x0026; Computing, University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Marwa","family":"Keshk","sequence":"additional","affiliation":[{"name":"School of Systems &#x0026; Computing, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6127-9349","authenticated-orcid":false,"given":"Nour","family":"Moustafa","sequence":"additional","affiliation":[{"name":"School of Systems &#x0026; Computing, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1235-9673","authenticated-orcid":false,"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Centre of Cyber Security Research &#x0026; Innovation (CCSRI), RMIT University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3297395"},{"key":"ref3","article-title":"Features and operation of an autonomous agent for cyber defense","author":"De Lucia","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.56801\/rebicte.v4i.67"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILTECHS.2019.8870070"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199.ch18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s19122651"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2799860"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199.ch1"},{"key":"ref12","article-title":"Efficient and resilient edge intelligence for the Internet of Battlefield Things","author":"Wigness","year":"2021","journal-title":"NATO S&T J."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.07.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599853"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3175844"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2866859"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017795"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1117\/12.2622823"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2020.2976977"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107623"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2019.01.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00125"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2876048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00112"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093784"},{"issue":"1","key":"ref28","first-page":"153","article-title":"Noisy operations on the silent battlefield","volume":"5","author":"Hare","year":"2020","journal-title":"Cyber Defense Rev."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2016.7496574"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2015.97.16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.231"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP51612.2020.9317401"},{"key":"ref33","article-title":"New defenses for the hybrid battlefield","author":"Maxwell","year":"2021","journal-title":"NATO S&T J."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s16101644"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04370-4_14"},{"key":"ref36","article-title":"Challenges and characteristics of intelligent autonomy for Internet of Battle Things in highly adversarial environments","author":"Kott","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.00033"},{"key":"ref45","volume-title":"Improving Web Application Security: Threats and Countermeasures","author":"Meier","year":"2003"},{"key":"ref46","article-title":"Owasp risk rating methodology","author":"Williams","year":"2003"},{"key":"ref47","article-title":"CVSS","year":"2019"},{"key":"ref48","article-title":"Trike v. 1 methodology document [draft]","author":"Saitta","year":"2005"},{"key":"ref49","article-title":"Linddun privacy engineering","author":"Group","year":"2020"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898390"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.85"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"ref53","article-title":"The coras method","year":"2023"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21236\/ADA470450"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/9781119593386.ch3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221466"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.02.255"},{"key":"ref58","article-title":"Threat modeling: A summary of available methods","author":"Shevchenko","year":"2018"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163066"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.1001.2100047"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9085227"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289476"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020736"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045395"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2019.00050"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599758"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.406"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289327"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC55196.2022.9953024"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1117\/12.2642579"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3201815"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/WSC52266.2021.9715532"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03618-y"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.024"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118641"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017673"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3418204"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148070"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ssci50451.2021.9659886"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC57344.2023.10099340"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200349"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2910243"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2809665"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101655"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.02.055"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3148453.3306243"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9660066"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39303-8_23"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8636060"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3360774.3368204"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2890431"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05881-4"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101970"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647236"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.011"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422729"},{"key":"ref97","first-page":"185","article-title":"Semantic edge computing and IoT architecture for military health services in battlefield","volume-title":"Proc. 14th Annu. IEEE Consum. Commun. Netw. Conf.","author":"Jara"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2015.7475314"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020774"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539353"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3049003"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761538"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357624"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00142-0"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109664"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2018.8820213"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845511"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888903"},{"key":"ref109","first-page":"1","article-title":"A novel IoBT security assessment framework: LoRaWan case study","volume-title":"Proc. Int. Command Control Res. Technol. Symp.","author":"Mancini"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389106"},{"key":"ref111","first-page":"749","article-title":"Investigating LoRa for the Internet of Battlefield Things: A cyber perspective","volume-title":"Proc. IEEE Mil. Commun. Conf.","author":"Jalaian"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2101072"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon53536.2022.9773889"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/AEECA55500.2022.9919023"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199.ch16"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/e22101166"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN54977.2022.9868920"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.02.020"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020889"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4397"},{"issue":"2","key":"ref121","first-page":"74","article-title":"Securing the internet of battlefield things while maintaining value to the warfighter","volume":"18","author":"Miller","year":"2019","journal-title":"J. Inf. Warfare"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289442"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950.ch20"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939722"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3132952"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138916"},{"key":"ref127","article-title":"Navigating the battlefield of AI: Opportunities and challenges for the australian army","author":"Rice","year":"2023"}],"container-title":["IEEE Transactions on Sustainable Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7274860\/10948540\/10636816.pdf?arnumber=10636816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T20:49:39Z","timestamp":1743799779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10636816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":120,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsusc.2024.3443256","relation":{},"ISSN":["2377-3782","2377-3790"],"issn-type":[{"value":"2377-3782","type":"electronic"},{"value":"2377-3790","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}