{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:17Z","timestamp":1750221077874,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301606","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"140-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["IoT Lotto"],"prefix":"10.1145","author":[{"given":"Mohammed M.","family":"Alani","sequence":"first","affiliation":[{"name":"Khawarizmi International College, UAE"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. IoT: Number of Connected Devices. https:\/\/www.statista.com\/statistics\/ 471264\/iot-number-of-connected-devices-worldwide\/. Accessed: 2018-10-08.  {n. d.}. IoT: Number of Connected Devices. https:\/\/www.statista.com\/statistics\/ 471264\/iot-number-of-connected-devices-worldwide\/. Accessed: 2018-10-08."},{"volume-title":"Differential cryptanalysis of the data encryption standard","author":"Biham Eli","key":"e_1_3_2_1_2_1","unstructured":"Eli Biham and Adi Shamir . 2012. Differential cryptanalysis of the data encryption standard . Springer Science & Business Media . Eli Biham and Adi Shamir. 2012. Differential cryptanalysis of the data encryption standard. Springer Science & Business Media."},{"volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"Daemen Joan","key":"e_1_3_2_1_3_1","unstructured":"Joan Daemen and Vincent Rijmen . 2013. The design of Rijndael: AES-the advanced encryption standard . Springer Science & Business Media . Joan Daemen and Vincent Rijmen. 2013. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"key":"e_1_3_2_1_5_1","volume-title":"Febbruary","author":"Khandelwal S","year":"2017","unstructured":"S Khandelwal . 2017. \" New Windows Trojan Spreads MIRAI Malware To Hack More IoT Devices . The Hacker News , Febbruary ( 2017 ). S Khandelwal. 2017. \" New Windows Trojan Spreads MIRAI Malware To Hack More IoT Devices. The Hacker News, Febbruary (2017)."},{"key":"e_1_3_2_1_6_1","article-title":"A survey on internet of things: Security and privacy issues","volume":"90","author":"Sathish Kumar J","year":"2014","unstructured":"J Sathish Kumar and Dhiren R Patel . 2014 . A survey on internet of things: Security and privacy issues . International Journal of Computer Applications 90 , 11 (2014). J Sathish Kumar and Dhiren R Patel. 2014. A survey on internet of things: Security and privacy issues. International Journal of Computer Applications 90, 11 (2014).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646759.705836"},{"volume-title":"Internet of Things","author":"Mukhopadhyay Subhas Chandra","key":"e_1_3_2_1_10_1","unstructured":"Subhas Chandra Mukhopadhyay and Nagender K Suryadevara . 2014. Internet of things: Challenges and opportunities . In Internet of Things . Springer , 1--17. Subhas Chandra Mukhopadhyay and Nagender K Suryadevara. 2014. Internet of things: Challenges and opportunities. In Internet of Things. Springer, 1--17."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1049\/et.2016.1112","article-title":"Webcam hack shows vulnerability of connected devices","volume":"11","author":"Pultarova Tereza","year":"2016","unstructured":"Tereza Pultarova . 2016 . Webcam hack shows vulnerability of connected devices . Engineering & Technology 11 , 11 (2016), 10 -- 10 . Tereza Pultarova. 2016. Webcam hack shows vulnerability of connected devices. Engineering & Technology 11, 11 (2016), 10--10.","journal-title":"Engineering & Technology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/618973.619779"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_14_1","volume-title":"Data encryption standard. Federal Information Processing Standards Publication","author":"Standard Data Encryption","year":"1999","unstructured":"Data Encryption Standard . 1999. Data encryption standard. Federal Information Processing Standards Publication ( 1999 ). Data Encryption Standard. 1999. Data encryption standard. Federal Information Processing Standards Publication (1999)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2417"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2737091"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301606"}},"subtitle":["Utilizing IoT Devices in Brute-Force Attacks"],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":15,"alternative-id":["10.1145\/3301551.3301606","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301606","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}