{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:26:56Z","timestamp":1730305616042,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/wincom59760.2023.10322883","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:07:27Z","timestamp":1700680047000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Internet of Things Systems Security Based on the Physical Objects: An overview"],"prefix":"10.1109","author":[{"given":"Abdelkabir","family":"Rouagubi","sequence":"first","affiliation":[{"name":"Ibn Tofail University,Engineering Sciences Laboratory National School of Applied Sciences,Kenitra,Morocco"}]},{"given":"Khalid","family":"Chougdali","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,Engineering Sciences Laboratory National School of Applied Sciences,Kenitra,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/inventions4010022"},{"key":"ref2","first-page":"104","article-title":"Future generation computer systems","volume":"49","author":"Yao","year":"2015","journal-title":"Elsevier Journal"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2583","DOI":"10.1109\/JIOT.2018.2872028","article-title":"Security and privacy issues of physical objects in the IoT","volume":"6","author":"Hu","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app7101069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.74"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812803"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM55661.2022.9966417"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.038"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref14","article-title":"5 of the Worst IoT Hacking Threats in History","author":"Benjamin McDermott","year":"2020","journal-title":"Dogtown Media"},{"journal-title":"Series Y: Global Information, Rec. Y.2060","article-title":"Overview of the Internet of Things (IoT)","year":"2012","key":"ref15"},{"issue":"4","key":"ref16","first-page":"46","article-title":"Security of cyber identity in the IoT","volume":"46","author":"Ning","year":"2013","journal-title":"Computer Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.218"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700247"},{"journal-title":"Series X: The fundamentals of IoT, Rec. X.1361","article-title":"Security framework for IoT based on the gateway model","year":"2018","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM55661.2022.9966451"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.09.001"}],"event":{"name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2023,10,26]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,10,28]]}},"container-title":["2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10322877\/10322879\/10322883.pdf?arnumber=10322883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T21:41:37Z","timestamp":1709415697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10322883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wincom59760.2023.10322883","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}