{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:54:13Z","timestamp":1770566053496,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3277593.3277596","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T19:40:57Z","timestamp":1539286857000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["An attack tree based risk evaluation approach for the internet of things"],"prefix":"10.1145","author":[{"given":"Waqar","family":"Asif","sequence":"first","affiliation":[{"name":"University of London, UK"}]},{"given":"Indranil Ghosh","family":"Ray","sequence":"additional","affiliation":[{"name":"University of London, UK"}]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[{"name":"University of London, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Shahzaib Tahir, and Muttukrishnan Rajarajan.","author":"Asif Waqar","year":"2018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2013.6552329"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.11.009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"key":"e_1_3_2_1_5_1","volume-title":"Risk factors of enterprise internal control: Governance refers to internet of things (iot) environment. RISK","author":"Chang I","year":"2016"},{"key":"e_1_3_2_1_6_1","volume-title":"A risk assessment framework and software toolkit for cloud service ecosystems. Cloud Computing","author":"Djemame Karim","year":"2011"},{"key":"e_1_3_2_1_7_1","volume-title":"Automating risk analysis of software design models. The Scientific World Journal 2014","author":"Frydman Maxime","year":"2014"},{"key":"e_1_3_2_1_8_1","volume-title":"Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, 600--607","author":"Kasinathan Prabhakaran","year":"2013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.106972"},{"key":"e_1_3_2_1_10_1","article-title":"A survey on internet of things: Security and privacy issues","volume":"90","author":"Sathish Kumar J","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2012.6234533"},{"key":"e_1_3_2_1_12_1","first-page":"28","article-title":"Security model and key technology on Internet of Things","volume":"4","author":"Liu YB","year":"2010","journal-title":"Digital Communication"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868461"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9210-z"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10803548.2016.1214431"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962947"},{"key":"e_1_3_2_1_18_1","unstructured":"Matthew Tentilucci Nick Roberts Shreshth Kandari Daryl Johnson Bill Stackpole and George Markowsky. 2015. Crowdsourcing Computer Security Attack Trees. (2015).  Matthew Tentilucci Nick Roberts Shreshth Kandari Daryl Johnson Bill Stackpole and George Markowsky. 2015. Crowdsourcing Computer Security Attack Trees. (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248377"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308172.1308237"}],"event":{"name":"IOT '18: 8th International Conference on the Internet of Things","location":"Santa Barbara California USA","acronym":"IOT '18"},"container-title":["Proceedings of the 8th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3277593.3277596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3277593.3277596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:25Z","timestamp":1750207465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3277593.3277596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":20,"alternative-id":["10.1145\/3277593.3277596","10.1145\/3277593"],"URL":"https:\/\/doi.org\/10.1145\/3277593.3277596","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}