{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:15Z","timestamp":1761581955755,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":131,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T00:00:00Z","timestamp":1555286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["Marie Sk?odowska-Curie grant agreement No. 764785"],"award-info":[{"award-number":["Marie Sk?odowska-Curie grant agreement No. 764785"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,15]]},"DOI":"10.1145\/3313150.3313228","type":"proceedings-article","created":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T16:24:54Z","timestamp":1587745494000},"page":"56-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Towards a systematic survey of industrial IoT security requirements"],"prefix":"10.1145","author":[{"given":"Koen","family":"Tange","sequence":"first","affiliation":[{"name":"Technical University of Denmark"}]},{"given":"Michele","family":"De Donno","sequence":"additional","affiliation":[{"name":"Technical University of Denmark"}]},{"given":"Xenofon","family":"Fafoutis","sequence":"additional","affiliation":[{"name":"Technical University of Denmark"}]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"Technical University of Denmark and \u00d6rebro University"}]}],"member":"320","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2855198"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D. Airehrour J. Gutierrez and S. K. Ray. 2016. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In 2016 26<sup>th<\/sup> International Telecommunication Networks and Applications Conference (ITNAC). IEEE 115--120.  D. Airehrour J. Gutierrez and S. K. Ray. 2016. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In 2016 26<sup>th<\/sup> International Telecommunication Networks and Applications Conference (ITNAC). IEEE 115--120.","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241403.3241450"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"volume-title":"2018 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC). IEEE, 1--8.","author":"Autenrieth P.","key":"e_1_3_2_1_5_1"},{"volume-title":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 173--178","author":"Bakhshi Z.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.02.039"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"E. Bauer O. Schluga S. Maksuti A. Bicaku D. Hofbauer I. Ivkic M. G. Tauber and A. W\u00f6hrer. 2017. Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. In 2017 12<sup>th<\/sup> International Conference for Internet Technology and Secured Transactions (ICITST). IEEE 427--432.  E. Bauer O. Schluga S. Maksuti A. Bicaku D. Hofbauer I. Ivkic M. G. Tauber and A. W\u00f6hrer. 2017. Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. In 2017 12<sup>th<\/sup> International Conference for Internet Technology and Secured Transactions (ICITST). IEEE 427--432.","DOI":"10.23919\/ICITST.2017.8356438"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"A. B\u00e9cue Y. Fourastier I. Pra\u00e7a A. Savarit C. Baron B. Gradussofs E. Pouille and C. Thomas. 2018. CyberFactory#1 - Securing the industry 4.0 with cyber-ranges and digital twins. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--4.  A. B\u00e9cue Y. Fourastier I. Pra\u00e7a A. Savarit C. Baron B. Gradussofs E. Pouille and C. Thomas. 2018. CyberFactory#1 - Securing the industry 4.0 with cyber-ranges and digital twins. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--4.","DOI":"10.1109\/WFCS.2018.8402377"},{"volume-title":"Proceedings of the 12th International Conference on Scientometrics and Informetrics (ISSI'09","author":"Beel J.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"M. Beltr\u00e1n M. Calvo and S. Gonz\u00e1lez. 2017. Federated system-to-service authentication and authorization combining PUFs and tokens. In 2017 12<sup>th<\/sup> International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC). IEEE 1--8.  M. Beltr\u00e1n M. Calvo and S. Gonz\u00e1lez. 2017. Federated system-to-service authentication and authorization combining PUFs and tokens. In 2017 12<sup>th<\/sup> International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC). IEEE 1--8.","DOI":"10.1109\/ReCoSoC.2017.8016157"},{"volume-title":"Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 1--5.","author":"Benias N.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"A. Bicaku S. Maksuti S. Palkovits-Rauter M. Tauber R. Matischek C. Schmittner G. Mantas M. Thron and J. Delsing. 2017. Towards trustworthy end-to-end communication in industry 4.0. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 889--896.  A. Bicaku S. Maksuti S. Palkovits-Rauter M. Tauber R. Matischek C. Schmittner G. Mantas M. Thron and J. Delsing. 2017. Towards trustworthy end-to-end communication in industry 4.0. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 889--896.","DOI":"10.1109\/INDIN.2017.8104889"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"A. Bicaku C. Schmittner M. Tauber and J. Delsing. 2018. Monitoring Industry 4.0 applications for security and safety standard compliance. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 749--754.  A. Bicaku C. Schmittner M. Tauber and J. Delsing. 2018. Monitoring Industry 4.0 applications for security and safety standard compliance. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 749--754.","DOI":"10.1109\/ICPHYS.2018.8390801"},{"volume-title":"Agent-based PKI for Distributed Control System. In 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 28--35","author":"Blanch-Torn\u00e9 S.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"G. Bloom B. Alsulami E. Nwafor and I. C. Bertolotti. 2018. Design patterns for the industrial Internet of Things. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--10.  G. Bloom B. Alsulami E. Nwafor and I. C. Bertolotti. 2018. Design patterns for the industrial Internet of Things. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--10.","DOI":"10.1109\/WFCS.2018.8402353"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Bluschke W. Bueschel M. Hohmuth F. Jehring R. Kaminski K. Klamka S. Koepsell A. Lackorzynski T. Lackorzynski M. Matthews P. Rietzsch A. Senier P. Sieber V. Ulrich R. Wiggers and J. Wolter. 2018. fastvpn - Secure and Flexible Networking for Industry 4.0. In Broadband Coverage in Germany; 12<sup>th<\/sup> ITG-Symposium. VDE 1--8. https:\/\/imld.de\/en\/research\/research-projects\/fastvpn\/  A. Bluschke W. Bueschel M. Hohmuth F. Jehring R. Kaminski K. Klamka S. Koepsell A. Lackorzynski T. Lackorzynski M. Matthews P. Rietzsch A. Senier P. Sieber V. Ulrich R. Wiggers and J. Wolter. 2018. fastvpn - Secure and Flexible Networking for Industry 4.0. In Broadband Coverage in Germany; 12<sup>th<\/sup> ITG-Symposium. VDE 1--8. https:\/\/imld.de\/en\/research\/research-projects\/fastvpn\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"R. Chaturvedi. 2017. UL testing standards to mitigate cybersecurity risk ~ UL's approach with complement to the other standards for SICE 2017. In 2017 56<sup>th<\/sup> Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE). IEEE 728--730.  R. Chaturvedi. 2017. UL testing standards to mitigate cybersecurity risk ~ UL's approach with complement to the other standards for SICE 2017. In 2017 56<sup>th<\/sup> Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE). IEEE 728--730.","DOI":"10.23919\/SICE.2017.8105618"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M. Cheminod L. Durante L. Seno F. Valenza A. Valenzano and C. Zunino. 2017. Leveraging SDN to improve security in industrial networks. In 2017 IEEE 13<sup>th<\/sup> International Workshop on Factory Communication Systems (WFCS). IEEE 1--7.  M. Cheminod L. Durante L. Seno F. Valenza A. Valenzano and C. Zunino. 2017. Leveraging SDN to improve security in industrial networks. In 2017 IEEE 13<sup>th<\/sup> International Workshop on Factory Communication Systems (WFCS). IEEE 1--7.","DOI":"10.1109\/WFCS.2017.7991960"},{"volume-title":"TENCON 2017 - 2017 IEEE Region 10 Conference. IEEE, 1219--1224","author":"Chen G.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2751586"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3199700.3199844"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841049"},{"key":"e_1_3_2_1_26_1","first-page":"938","article-title":"Using Smart Edge IoT Devices for Safer","volume":"104","author":"Condry M. W.","year":"2016","journal-title":"Rapid Response With Industry IoT Control Operations. Proc. IEEE"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2813304"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"B. Czybik S. Hausmann S. Heiss and J. Jasperneite. 2013. Performance evaluation of MAC algorithms for real-time Ethernet communication systems. In 2013 11<sup>th<\/sup> IEEE International Conference on Industrial Informatics (INDIN). IEEE 676--681.  B. Czybik S. Hausmann S. Heiss and J. Jasperneite. 2013. Performance evaluation of MAC algorithms for real-time Ethernet communication systems. In 2013 11<sup>th<\/sup> IEEE International Conference on Industrial Informatics (INDIN). IEEE 676--681.","DOI":"10.1109\/INDIN.2013.6622965"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877690"},{"volume-title":"Analysis of DDoS-Sapable IoT Malwares. In Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE, 807--816","year":"2017","author":"Donno Michele De","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Michele De Donno Nicola Dragoni Alberto Giaretta and Angelo Spognardi. 2018. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018 (2018).  Michele De Donno Nicola Dragoni Alberto Giaretta and Angelo Spognardi. 2018. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018 (2018).","DOI":"10.1155\/2018\/7178164"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2759342"},{"volume-title":"Proceedings of 5th International Conference in Software Engineering for Defence Applications","author":"Dragoni Nicola","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"M. H. Eldefrawy N. Pereira and M. Gidlund. 2018. Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates. IEEE Internet of Things Journal (2018). (early access).  M. H. Eldefrawy N. Pereira and M. Gidlund. 2018. Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates. IEEE Internet of Things Journal (2018). (early access).","DOI":"10.1109\/JIOT.2018.2865212"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791956"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2822842"},{"volume-title":"IECON 2018 - 44<sup>th<\/sup> Annual Conference of the IEEE Industrial Electronics Society. IEEE, 5221--5227","author":"Feng X.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"H. Flatt S. Schriegel J. Jasperneite H. Trsek and H. Adamczyk. 2016. Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In 2016 IEEE 21<sup>st<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE 1--4.  H. Flatt S. Schriegel J. Jasperneite H. Trsek and H. Adamczyk. 2016. Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In 2016 IEEE 21<sup>st<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE 1--4.","DOI":"10.1109\/ETFA.2016.7733634"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"J. L. Flores and I. Mugarza. 2018. Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems. In 2018 IEEE 23<sup>rd<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA) Vol. 1. IEEE 948--955.  J. L. Flores and I. Mugarza. 2018. Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems. In 2018 IEEE 23<sup>rd<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA) Vol. 1. IEEE 948--955.","DOI":"10.1109\/ETFA.2018.8502660"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2832041"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863244"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389155"},{"volume-title":"Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, 136--144","author":"Hoeller A.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3239242"},{"volume-title":"Enhancing Security and Reliability for Smart- Systems' Architectures. In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 150--153","year":"2018","author":"Hofer F.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324414"},{"volume-title":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 637--638","author":"Huang Y.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"F. Janu\u00e1rio C. Carvalho A. Cardoso and P. Gil. 2016. Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. In 2016 8<sup>th<\/sup> International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE 363--368.  F. Janu\u00e1rio C. Carvalho A. Cardoso and P. Gil. 2016. Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. In 2016 8<sup>th<\/sup> International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE 363--368.","DOI":"10.1109\/ICUMT.2016.7765386"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2814063"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2601918"},{"key":"e_1_3_2_1_54_1","unstructured":"H. Kagermann W. Wahlster and J. Helbig. 2013. Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0 - Securing the Future of German Manufacturing Industry. Final Report of the Industrie 4.0 Working Group. acatech - National Academy of Science and Engineering M\u00fcnchen. http:\/\/forschungsunion.de\/pdf\/industrie_4_0_final_report.pdf  H. Kagermann W. Wahlster and J. Helbig. 2013. Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0 - Securing the Future of German Manufacturing Industry. Final Report of the Industrie 4.0 Working Group. acatech - National Academy of Science and Engineering M\u00fcnchen. http:\/\/forschungsunion.de\/pdf\/industrie_4_0_final_report.pdf"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"E. Kail A. Banati E. L\u00e1szlo and M. Kozlovszky. 2018. Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands. In 2018 IEEE 12<sup>th<\/sup> International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE 000449--000454.  E. Kail A. Banati E. L\u00e1szlo and M. Kozlovszky. 2018. Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands. In 2018 IEEE 12<sup>th<\/sup> International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE 000449--000454.","DOI":"10.1109\/SACI.2018.8440945"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"volume-title":"2017 IEEE Symposium on Computers and Communications (ISCC). IEEE, 1193--1200","author":"Katsikeas S.","key":"e_1_3_2_1_57_1"},{"volume-title":"Abnormal Traffic Detection Mechanism for Protecting IIoT Environments. In 2018 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 943--945","author":"Kim B.","key":"e_1_3_2_1_58_1"},{"volume-title":"2018 International Conference on Information Networking (ICOIN). IEEE, 863--868","author":"Kim Y.","key":"e_1_3_2_1_59_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"T. Kobzan S. Schriegel S. Althoff A. Boschmann J. Otto and J. Jasperneite. 2018. Secure and Time-sensitive Communication for Remote Process Control and Monitoring. In 2018 IEEE 23<sup>rd<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA) Vol. 1. IEEE 1105--1108.  T. Kobzan S. Schriegel S. Althoff A. Boschmann J. Otto and J. Jasperneite. 2018. Secure and Time-sensitive Communication for Remote Process Control and Monitoring. In 2018 IEEE 23<sup>rd<\/sup> International Conference on Emerging Technologies and Factory Automation (ETFA) Vol. 1. IEEE 1105--1108.","DOI":"10.1109\/ETFA.2018.8502539"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"K. K. Kolluru C. Paniagua J. van Deventer J. Eliasson J. Delsing and R. J. DeLong. 2018. An AAA solution for securing industrial IoT devices using next generation access control. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 737--742.  K. K. Kolluru C. Paniagua J. van Deventer J. Eliasson J. Delsing and R. J. DeLong. 2018. An AAA solution for securing industrial IoT devices using next generation access control. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 737--742.","DOI":"10.1109\/ICPHYS.2018.8390799"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"F. Kurtz C. Bektas N. Dorsch and C. Wietfeld. 2018. Network Slicing for Critical Communications in Shared 5G Infrastructures - An Empirical Evaluation. In 2018 4<sup>th<\/sup> IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE 393--399.  F. Kurtz C. Bektas N. Dorsch and C. Wietfeld. 2018. Network Slicing for Critical Communications in Shared 5G Infrastructures - An Empirical Evaluation. In 2018 4<sup>th<\/sup> IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE 393--399.","DOI":"10.1109\/NETSOFT.2018.8460110"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"E. Laarouchi D. Cancila and H. Chaouchi. 2017. Safety and degraded mode in civilian applications of unmanned aerial systems. In 2017 IEEE\/AIAA 36<sup>th<\/sup> Digital Avionics Systems Conference (DASC). IEEE 1--7.  E. Laarouchi D. Cancila and H. Chaouchi. 2017. Safety and degraded mode in civilian applications of unmanned aerial systems. In 2017 IEEE\/AIAA 36<sup>th<\/sup> Digital Avionics Systems Conference (DASC). IEEE 1--7.","DOI":"10.1109\/DASC.2017.8102040"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"M. Langfinger M. Schneider D. Stricker and H. D. Schotten. 2017. Addressing security challenges in industrial augmented reality systems. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 299--304.  M. Langfinger M. Schneider D. Stricker and H. D. Schotten. 2017. Addressing security challenges in industrial augmented reality systems. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 299--304.","DOI":"10.1109\/INDIN.2017.8104789"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"volume-title":"2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 153--158","author":"Laszka A.","key":"e_1_3_2_1_67_1"},{"volume-title":"CRASHOVERRIDE: Analysis of the threat to electric grid operations. Technical Report","year":"2017","author":"Lee R","key":"e_1_3_2_1_68_1"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"C. Lesjak H. Bock D. Hein and M. Maritsch. 2016. Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT. In 2016 IEEE 14<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 706--713.  C. Lesjak H. Bock D. Hein and M. Maritsch. 2016. Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT. In 2016 IEEE 14<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 706--713.","DOI":"10.1109\/INDIN.2016.7819251"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"C. Lesjak D. Hein M. Hofmann M. Maritsch A. Aldrian P. Priller T. Ebner T. Ruprechter and G. Pregartner. 2015. Securing smart maintenance services: Hardware-security and TLS for MQTT. In 2015 IEEE 13<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 1243--1250.  C. Lesjak D. Hein M. Hofmann M. Maritsch A. Aldrian P. Priller T. Ebner T. Ruprechter and G. Pregartner. 2015. Securing smart maintenance services: Hardware-security and TLS for MQTT. In 2015 IEEE 13<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 1243--1250.","DOI":"10.1109\/INDIN.2015.7281913"},{"volume-title":"IECON 2015 - 41<sup>st<\/sup> Annual Conference of the IEEE Industrial Electronics Society. IEEE, 002589--002595","author":"Lesjak C.","key":"e_1_3_2_1_71_1"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"C. Lesjak T. Ruprechter H. Bock J. Haid and E. Brenner. 2014. ESTADO --- Enabling smart services for industrial equipment through a secured transparent and ad-hoc data transmission online. In The 9<sup>th<\/sup> International Conference for Internet Technology and Secured Transactions (ICITST-2014). IEEE 171--177.  C. Lesjak T. Ruprechter H. Bock J. Haid and E. Brenner. 2014. ESTADO --- Enabling smart services for industrial equipment through a secured transparent and ad-hoc data transmission online. In The 9<sup>th<\/sup> International Conference for Internet Technology and Secured Transactions (ICITST-2014). IEEE 171--177.","DOI":"10.1109\/ICITST.2014.7038800"},{"volume-title":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). IEEE, 1--7.","author":"Lesjak C.","key":"e_1_3_2_1_73_1"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.09.004"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.036"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"e_1_3_2_1_78_1","first-page":"3690","article-title":"Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things","volume":"14","author":"Li Z.","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"L. Liang Y. Liu Y. Yao T. Yang Y. Hu and C. Ling. 2017. Security challenges and risk evaluation framework for industrial wireless sensor networks. In 2017 4<sup>th<\/sup> International Conference on Control Decision and Information Technologies (CoDIT). IEEE 0904--0907.  L. Liang Y. Liu Y. Yao T. Yang Y. Hu and C. Ling. 2017. Security challenges and risk evaluation framework for industrial wireless sensor networks. In 2017 4<sup>th<\/sup> International Conference on Control Decision and Information Technologies (CoDIT). IEEE 0904--0907.","DOI":"10.1109\/CoDIT.2017.8102711"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"volume-title":"2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, 153--159","author":"Ma Z.","key":"e_1_3_2_1_82_1"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"S. Maksuti A. Bicaku M. Tauber S. Palkovits-Rauter S. Haas and J. Delsing. 2017. Towards flexible and secure end-to-end communication in industry 4.0. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 883--888.  S. Maksuti A. Bicaku M. Tauber S. Palkovits-Rauter S. Haas and J. Delsing. 2017. Towards flexible and secure end-to-end communication in industry 4.0. In 2017 IEEE 15<sup>th<\/sup> International Conference on Industrial Informatics (INDIN). IEEE 883--888.","DOI":"10.1109\/INDIN.2017.8104888"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"G. Marchetto R. Sisto J. Yusupov and A. Ksentinit. 2018. Formally verified latency-aware VNF placement in industrial Internet of things. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--9.  G. Marchetto R. Sisto J. Yusupov and A. Ksentinit. 2018. Formally verified latency-aware VNF placement in industrial Internet of things. In 2018 14<sup>th<\/sup> IEEE International Workshop on Factory Communication Systems (WFCS). IEEE 1--9.","DOI":"10.1109\/WFCS.2018.8402355"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"crossref","unstructured":"S. Marksteiner. 2018. Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective. In 2018 IEEE 20<sup>th<\/sup> Conference on Business Informatics (CBI) Vol. 02. IEEE 140--143.  S. Marksteiner. 2018. Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective. In 2018 IEEE 20<sup>th<\/sup> Conference on Business Informatics (CBI) Vol. 02. IEEE 140--143.","DOI":"10.1109\/CBI.2018.10060"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"D. W. McKee S. J. Clement J. Almutairi and J. Xu. 2017. Massive-Scale Automation in Cyber-Physical Systems: Vision amp;amp; Challenges. In 2017 IEEE 13<sup>th<\/sup> International Symposium on Autonomous Decentralized System (ISADS). IEEE 5--11.  D. W. McKee S. J. Clement J. Almutairi and J. Xu. 2017. Massive-Scale Automation in Cyber-Physical Systems: Vision amp;amp; Challenges. In 2017 IEEE 13<sup>th<\/sup> International Symposium on Autonomous Decentralized System (ISADS). IEEE 5--11.","DOI":"10.1109\/ISADS.2017.56"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2018.0010"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"crossref","unstructured":"A. Melis D. Berardi C. Contoli F. Callegati F. Esposito and M. Prandini. 2018. A Policy Checker Approach for Secure Industrial SDN. In 2018 2<sup>nd<\/sup> Cyber Security in Networking Conference (CSNet). IEEE 1--7.  A. Melis D. Berardi C. Contoli F. Callegati F. Esposito and M. Prandini. 2018. A Policy Checker Approach for Secure Industrial SDN. In 2018 2<sup>nd<\/sup> Cyber Security in Networking Conference (CSNet). IEEE 1--7.","DOI":"10.1109\/CSNET.2018.8602927"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2832853"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844794"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"crossref","unstructured":"J. Moyne S. Mashiro and D. Gross. 2018. Determining a security road map for the microelectronics industry. In 2018 29<sup>th<\/sup> Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC). IEEE 291--294.  J. Moyne S. Mashiro and D. Gross. 2018. Determining a security road map for the microelectronics industry. In 2018 29<sup>th<\/sup> Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC). IEEE 291--294.","DOI":"10.1109\/ASMC.2018.8373213"},{"volume-title":"Cetratus: Towards a live patching supported runtime for mixed-criticality safe and secure systems. In 2018 IEEE 13<sup>th<\/sup> International Symposium on Industrial Embedded Systems (SIES)","year":"2018","author":"Mugarza I.","key":"e_1_3_2_1_92_1"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"crossref","unstructured":"E. T. Nakamura and S. L. Ribeiro. 2018. A Privacy Security Safety Resilience and Reliability Focused Risk Assessment Methodology for IIoT Systems Steps to Build and Use Secure IIoT Systems. In 2018 Global Internet of Things Summit (GIoTS). IEEE 1--6.  E. T. Nakamura and S. L. Ribeiro. 2018. A Privacy Security Safety Resilience and Reliability Focused Risk Assessment Methodology for IIoT Systems Steps to Build and Use Secure IIoT Systems. In 2018 Global Internet of Things Summit (GIoTS). IEEE 1--6.","DOI":"10.1109\/GIOTS.2018.8534521"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.23919\/AE.2017.8053600"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2018.01.005"},{"volume-title":"Manufacturing Engineering Society International Conference 2017, MESIC 2017, 28--30","year":"2017","author":"Pereira T.","key":"e_1_3_2_1_97_1"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"crossref","unstructured":"D. Preuveneers W. Joosen and E. Ilie-Zudor. 2016. Data Protection Compliance Regulations and Implications for Smart Factories of the Future. In 2016 12<sup>th<\/sup> International Conference on Intelligent Environments (IE). IEEE 40--47.  D. Preuveneers W. Joosen and E. Ilie-Zudor. 2016. Data Protection Compliance Regulations and Implications for Smart Factories of the Future. In 2016 12<sup>th<\/sup> International Conference on Intelligent Environments (IE). IEEE 40--47.","DOI":"10.1109\/IE.2016.15"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019861"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"crossref","unstructured":"P. Radanliev D. De Roure S. Cannady R. M. Montalvo R. Nicolescu and M. Huth. 2018. Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET 1--9.  P. Radanliev D. De Roure S. Cannady R. M. Montalvo R. Nicolescu and M. Huth. 2018. Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET 1--9.","DOI":"10.1049\/cp.2018.0003"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"volume-title":"2017 Petroleum and Chemical Industry Technical Conference (PCIC). IEEE, 97--102","author":"Sandberg C.","key":"e_1_3_2_1_104_1"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"crossref","unstructured":"J. Schuette and G. S. Brost. 2018. LUCON: Data Flow Control for Message-Based IoT Systems. In 2018 17<sup>th<\/sup> IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12<sup>th<\/sup> IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE 289--299.  J. Schuette and G. S. Brost. 2018. LUCON: Data Flow Control for Message-Based IoT Systems. In 2018 17<sup>th<\/sup> IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12<sup>th<\/sup> IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE 289--299.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00052"},{"volume-title":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security. IEEE, 182--188","author":"Seitz A.","key":"e_1_3_2_1_106_1"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"crossref","unstructured":"G. Settanni F. Skopik A. Karaj M. Wurzenberger and R. Fiedler. 2018. Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 173--180.  G. Settanni F. Skopik A. Karaj M. Wurzenberger and R. Fiedler. 2018. Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 173--180.","DOI":"10.1109\/ICPHYS.2018.8387655"},{"volume-title":"2018 International Conference on System Science and Engineering (ICSSE). IEEE, 1--5.","author":"Shaabany G.","key":"e_1_3_2_1_108_1"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856368"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2700268"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"crossref","unstructured":"V. Sklyar and V. Kharchenko. 2017. Challenges in assurance case application for industrial IoT. In 2017 9<sup>th<\/sup> IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) Vol. 2. IEEE 736--739.  V. Sklyar and V. Kharchenko. 2017. Challenges in assurance case application for industrial IoT. In 2017 9<sup>th<\/sup> IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) Vol. 2. IEEE 736--739.","DOI":"10.1109\/IDAACS.2017.8095187"},{"volume-title":"2018 IEEE International Conference on Innovative Research and Development (ICIRD). IEEE, 1--4.","author":"Solangi Z. A.","key":"e_1_3_2_1_113_1"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.11.005"},{"volume-title":"Automation Test in Europe Conference Exhibition (DATE). IEEE, 1203--1204","author":"Traub M.","key":"e_1_3_2_1_115_1"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700632"},{"volume-title":"2017 IEEE International Conference on Industrial Technology (ICIT). IEEE, 1430--1435","author":"Ulz T.","key":"e_1_3_2_1_117_1"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"crossref","unstructured":"T. Ulz T. Pieber C. Steger S. Haas and R. Matischek. 2018. Secured remote configuration approach for industrial cyber-physical systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 812--817.  T. Ulz T. Pieber C. Steger S. Haas and R. Matischek. 2018. Secured remote configuration approach for industrial cyber-physical systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 812--817.","DOI":"10.1109\/ICPHYS.2018.8390811"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"crossref","unstructured":"B. van Lier. 2017. The industrial internet of things and cyber security: An ecological and systemic perspective on security in digital industrial ecosystems. In 2017 21<sup>st<\/sup> International Conference on System Theory Control and Computing (ICSTCC). IEEE 641--647.  B. van Lier. 2017. The industrial internet of things and cyber security: An ecological and systemic perspective on security in digital industrial ecosystems. In 2017 21<sup>st<\/sup> International Conference on System Theory Control and Computing (ICSTCC). IEEE 641--647.","DOI":"10.1109\/ICSTCC.2017.8107108"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"crossref","unstructured":"R. Vanickis P. Jacob S. Dehghanzadeh and B. Lee. 2018. Access Control Policy Enforcement for Zero-Trust-Networking. In 2018 29<sup>th<\/sup> Irish Signals and Systems Conference (ISSC). IEEE 1--6.  R. Vanickis P. Jacob S. Dehghanzadeh and B. Lee. 2018. Access Control Policy Enforcement for Zero-Trust-Networking. In 2018 29<sup>th<\/sup> Irish Signals and Systems Conference (ISSC). IEEE 1--6.","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"crossref","unstructured":"K. Wallis F. Kemmer E. Jastremskoj and C. Reich. 2017. Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0. In 2017 5<sup>th<\/sup> International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE 101--107.  K. Wallis F. Kemmer E. Jastremskoj and C. Reich. 2017. Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0. In 2017 5<sup>th<\/sup> International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE 101--107.","DOI":"10.1109\/FiCloudW.2017.71"},{"key":"e_1_3_2_1_122_1","unstructured":"K. Matthias Weber Niklas Gudowsky and Georg Aichholzer. 2018. Foresight and technology assessment for the Austrian parliament - Finding new ways of debating the future of industry 4.0. Futures (2018).  K. Matthias Weber Niklas Gudowsky and Georg Aichholzer. 2018. Foresight and technology assessment for the Austrian parliament - Finding new ways of debating the future of industry 4.0. Futures (2018)."},{"volume-title":"2017 AEIT International Annual Conference. IEEE, 1--6.","author":"Weippl E.","key":"e_1_3_2_1_123_1"},{"key":"e_1_3_2_1_124_1","unstructured":"F. Xiao L. Sha Z. Yuan and R. Wang. 2018. VulHunter: A Discovery for unknown Bugs based on Analysis for known patches in Industry Internet of Things. IEEE Transactions on Emerging Topics in Computing (2018). (early access).  F. Xiao L. Sha Z. Yuan and R. Wang. 2018. VulHunter: A Discovery for unknown Bugs based on Analysis for known patches in Industry Internet of Things. IEEE Transactions on Emerging Topics in Computing (2018). (early access)."},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2784395"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.101"},{"volume-title":"2016 International Conference on Condition Monitoring and Diagnosis (CMD). IEEE, 782--785","author":"Yu M.","key":"e_1_3_2_1_129_1"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.105"},{"volume-title":"Anomaly Detection Methods for IIoT Networks. In 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE, 214--219","author":"Zhou L.","key":"e_1_3_2_1_131_1"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2846297"},{"volume-title":"Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning. In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 112--117","author":"Zolanvari M.","key":"e_1_3_2_1_133_1"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"crossref","unstructured":"E. Zugasti M. Iturbe I. Garitano and U. Zurutuza. 2018. Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments. In 2018 Global Internet of Things Summit (GIoTS). IEEE 1--6.  E. Zugasti M. Iturbe I. Garitano and U. Zurutuza. 2018. Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments. In 2018 Global Internet of Things Summit (GIoTS). IEEE 1--6.","DOI":"10.1109\/GIOTS.2018.8534574"}],"event":{"name":"CPS-IoT Week '19: Cyber-Physical Systems and Internet of Things Week 2019","acronym":"CPS-IoT Week '19","location":"Montreal Quebec Canada"},"container-title":["Proceedings of the Workshop on Fog Computing and the IoT"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313150.3313228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313150.3313228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:00Z","timestamp":1750204440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313150.3313228"}},"subtitle":["research method and quantitative analysis"],"short-title":[],"issued":{"date-parts":[[2019,4,15]]},"references-count":131,"alternative-id":["10.1145\/3313150.3313228","10.1145\/3313150"],"URL":"https:\/\/doi.org\/10.1145\/3313150.3313228","relation":{},"subject":[],"published":{"date-parts":[[2019,4,15]]},"assertion":[{"value":"2019-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}