{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:17:45Z","timestamp":1769167065436,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323411","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"192-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Deployment optimization of IoT devices through attack graph analysis"],"prefix":"10.1145","author":[{"given":"Noga","family":"Agmon","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev"}]},{"given":"Rami","family":"Puzis","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"106","article-title":"An ant colony optimization algorithm for network vulnerability analysis","volume":"2","author":"Abadi M","year":"2006","journal-title":"Iranian Journal of Electrical and Electronic Engineering"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2442691.2442752"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411264"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0288-5"},{"key":"e_1_3_2_1_7_1","unstructured":"Jay Beale Renaud Deraison Haroon Meer Roelof Temmingh and Charl Van Der Walt. 2004. Nessus network auditing. Syngress Publishing.   Jay Beale Renaud Deraison Haroon Meer Roelof Temmingh and Charl Van Der Walt. 2004. Nessus network auditing. Syngress Publishing."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.543-550"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868416"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.3"},{"key":"e_1_3_2_1_11_1","unstructured":"Mengmeng Ge Jin B. Hong Hani Alzaid and Dong Seong Kim. 2017. Security modeling and analysis of cross-protocol IoT devices. Proceedings - 16th IEEE International Conference on Trust Security and Privacy in Computing and Communications 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems (2017) 1043--1048.  Mengmeng Ge Jin B. Hong Hani Alzaid and Dong Seong Kim. 2017. Security modeling and analysis of cross-protocol IoT devices. Proceedings - 16th IEEE International Conference on Trust Security and Privacy in Computing and Communications 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems (2017) 1043--1048."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.102"},{"key":"e_1_3_2_1_13_1","volume-title":"Twenty-Second International Conference on Automated Planning and Scheduling.","author":"Gefen Avitan","year":"2012"},{"key":"e_1_3_2_1_14_1","volume-title":"IWAISe: First International Workshop on Artificial Intelligence in Security. 41","author":"Gonda Tom","year":"2017"},{"key":"e_1_3_2_1_15_1","volume-title":"Harms: Hierarchical attack representation models for network security analysis.","author":"Hong Jin","year":"2012"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2301819"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Tania Islam and Lingyu Wang. 2008. A heuristic approach to minimum-cost network hardening using attack graph. In 2008 New Technologies Mobility and Security. IEEE 1--5.  Tania Islam and Lingyu Wang. 2008. A heuristic approach to minimum-cost network hardening using attack graph. In 2008 New Technologies Mobility and Security. IEEE 1--5.","DOI":"10.1109\/NTMS.2008.ECP.9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.606"},{"key":"e_1_3_2_1_19_1","unstructured":"Richard E. Korf. 2010. Artificial Intelligence Search Algorithms. In Algorithms and theory of computation handbook Mikhail J. Atallah and Marina Blanton (Eds.). 22.   Richard E. Korf. 2010. Artificial Intelligence Search Algorithms. In Algorithms and theory of computation handbook Mikhail J. Atallah and Marina Blanton (Eds.). 22."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2012.6234533"},{"key":"e_1_3_2_1_21_1","unstructured":"Rob van der Meulen. 2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017 Up 31 Percent From 2016. Gartner (2017) 1. https:\/\/www.gartner.com\/newsroom\/id\/3598917  Rob van der Meulen. 2017. Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017 Up 31 Percent From 2016. Gartner (2017) 1. https:\/\/www.gartner.com\/newsroom\/id\/3598917"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3110"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696031"},{"key":"e_1_3_2_1_24_1","unstructured":"Philipp Morgner Stephan Mattejat and Zinaida Benenson. 2016. All your bulbs are belong to us: Investigating the current state of security in connected lighting systems. arXiv preprint arXiv:1608.03732 (2016).  Philipp Morgner Stephan Mattejat and Zinaida Benenson. 2016. All your bulbs are belong to us: Investigating the current state of security in connected lighting systems. arXiv preprint arXiv:1608.03732 (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9109-x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602117"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956451"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"e_1_3_2_1_29_1","volume-title":"In 14th USENIX Security Symposium. Citeseer.","author":"Ou Xinming","year":"2005"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60080-2_20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_34_1","volume-title":"Bluetooth: With low energy comes low security. In Presented as part of the 7th {USENIX} Workshop on Offensive Technologies.","author":"Ryan Mike","year":"2013"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179149"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177843"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Ivan Vaccari Enrico Cambiaso and Maurizio Aiello. 2017. Remotely Exploiting at Command Attacks on ZigBee Networks. Security and Communication Networks 2017 (2017).  Ivan Vaccari Enrico Cambiaso and Maurizio Aiello. 2017. Remotely Exploiting at Command Attacks on ZigBee Networks. Security and Communication Networks 2017 (2017).","DOI":"10.1155\/2017\/1723658"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"e_1_3_2_1_43_1","volume-title":"11th ToorCon conference","volume":"67","author":"Wright Joshua","year":"2009"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.024"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Rong Zhou and Eric A. Hansen. 2006. Breadth-first heuristic search. Artificial Intelligence (2006).   Rong Zhou and Eric A. Hansen. 2006. Breadth-first heuristic search. Artificial Intelligence (2006).","DOI":"10.1016\/j.artint.2005.12.002"},{"key":"e_1_3_2_1_49_1","first-page":"6","article-title":"ZigBee Exploited - The Good, the Bad and the Ugly","volume":"16","author":"Zillner Tobias","year":"2015","journal-title":"Black Hat"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":47,"alternative-id":["10.1145\/3317549.3323411","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323411","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}