{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:38Z","timestamp":1750220858175,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369076","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security in a smart city"],"prefix":"10.1145","author":[{"given":"Tibari","family":"siham","sequence":"first","affiliation":[{"name":"ENSA kenitra, ibn tofail university, Morocco"}]},{"given":"Mazri","family":"Tomader","sequence":"additional","affiliation":[{"name":"ENSA kenitra, ibn Tofail University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444889"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.122"},{"volume-title":"Security and Privacy in Smart Cities: Issues and Current Solutions. 1st AUEIRC Conference Springer.","author":"Afzaal Muhammad","key":"e_1_3_2_1_3_1","unstructured":"Muhammad Afzaal , Talal Butt , Gerard. November .2017. Security and Privacy in Smart Cities: Issues and Current Solutions. 1st AUEIRC Conference Springer. Muhammad Afzaal, Talal Butt, Gerard. November .2017. Security and Privacy in Smart Cities: Issues and Current Solutions. 1st AUEIRC Conference Springer."},{"key":"e_1_3_2_1_4_1","unstructured":"Youyang Qu Mohammad Reza Nosouhi Lei Cui and Shui Yu .2019. Privacy Preservation in Smart Cities.  Youyang Qu Mohammad Reza Nosouhi Lei Cui and Shui Yu .2019. Privacy Preservation in Smart Cities."},{"volume-title":"Conference: 1st AUEIRC Conference","author":"M.","key":"e_1_3_2_1_5_1","unstructured":"M. Vinh Hoa La. October 2016. Security Monitoring for Network protocols and applications . Conference: 1st AUEIRC Conference , Springer M.Vinh Hoa La. October 2016. Security Monitoring for Network protocols and applications. Conference: 1st AUEIRC Conference, Springer"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119360124.ch5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITMQIS.2018.8524909"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Omar E. Elejla Mohammed Anbar & Bahari Belaton . 2016. ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review IETE Technical Review.  Omar E. Elejla Mohammed Anbar & Bahari Belaton . 2016. ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review IETE Technical Review.","DOI":"10.1080\/02564602.2016.1192964"},{"key":"e_1_3_2_1_9_1","unstructured":"M. Faqih Ridho Fatah Yasin S.T. M.T. Yusuf Sulistyo N S.T. M.Eng. 2014. ANALYSIS AND EVALUATION SNORT BRO AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER.  M. Faqih Ridho Fatah Yasin S.T. M.T. Yusuf Sulistyo N S.T. M.Eng. 2014. ANALYSIS AND EVALUATION SNORT BRO AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2017.8203943"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASE.2017.8374288"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0030"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.12948\/issn14531305\/20.1.2016.03"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"A.R.R. Berkel P.M. Singh M.J. van Sinderen. November 2017. An Information Security Architecture for Smart Cities.  A.R.R. Berkel P.M. Singh M.J. van Sinderen. November 2017. An Information Security Architecture for Smart Cities.","DOI":"10.1007\/978-3-319-94214-8_11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17040771"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"e_1_3_2_1_18_1","article-title":"Intrusion detection systems for IoT-based smart environments: a survey","author":"Elrawy Ali Ismail Awad Mohamed Faisal","year":"2017","unstructured":"Mohamed Faisal Elrawy Ali Ismail Awad Hesha A. Hamed . 2017 . Intrusion detection systems for IoT-based smart environments: a survey . Journal of Cloud Computing. Mohamed Faisal Elrawy Ali Ismail Awad Hesha A. Hamed .2017. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing.","journal-title":"Journal of Cloud Computing."},{"key":"e_1_3_2_1_19_1","unstructured":"https:\/\/priyachalakkal.wordpress.com\/2016\/03\/24\/suricata-snort-bro\/  https:\/\/priyachalakkal.wordpress.com\/2016\/03\/24\/suricata-snort-bro\/"},{"key":"e_1_3_2_1_20_1","unstructured":"M. Faqih Ridho Fatah Yasin S.T. M.T. Yusuf Sulistyo N S.T. M.Eng. ANALYSIS AND EVALUATION SNORT BRO AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER.  M. Faqih Ridho Fatah Yasin S.T. M.T. Yusuf Sulistyo N S.T. M.Eng. ANALYSIS AND EVALUATION SNORT BRO AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER."},{"key":"e_1_3_2_1_21_1","unstructured":"https:\/\/www.alienvault.com\/blogs\/security-essentials\/open-source-intrusion-detection-tools-a-quick-overview.  https:\/\/www.alienvault.com\/blogs\/security-essentials\/open-source-intrusion-detection-tools-a-quick-overview."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2018.00028"}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369076"}},"subtitle":["challenges and solutions"],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":22,"alternative-id":["10.1145\/3368756.3369076","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369076","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}