{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:24:10Z","timestamp":1761805450182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372958","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["What does mean search engine for IOT or IOT search engine"],"prefix":"10.1145","author":[{"given":"Fatima Zahra","family":"Fagroud","sequence":"first","affiliation":[{"name":"Laboratory of Information, Technology and Modeling, Hassan II University Sidi Othman, Casablanca, Morocco"}]},{"given":"El Habib","family":"Ben Lahmar","sequence":"additional","affiliation":[{"name":"Laboratory of Information Technology and Modeling, Hassan II University Sidi Othman, Casablanca, Morocco"}]},{"given":"Mohamed","family":"Amine","sequence":"additional","affiliation":[{"name":"TALHAOUI Offshore Research Center"}]},{"given":"Hicham","family":"Toumi","sequence":"additional","affiliation":[{"name":"Higher School of Technology - Sidi Bennour Choua\u00efb Doukkali, University El Jadida, Morocco"}]},{"given":"Sanaa","family":"El Filali","sequence":"additional","affiliation":[{"name":"Laboratory of Information Technology and Modeling, Hassan II University Sidi Othman Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies, 299--302","author":"Arnaert M.","year":"2016","unstructured":"Arnaert , M. , Bertrand , Y. , & Boudaoud , K. ( 2016 ). Modeling vulnerable Internet of Things on SHODAN and CENSYS: An ontology for cyber security . In SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies, 299--302 . Arnaert, M., Bertrand, Y., & Boudaoud, K. (2016). Modeling vulnerable Internet of Things on SHODAN and CENSYS: An ontology for cyber security. In SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies, 299--302."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Benghozi P. J. Bureau S. & Massit-Folea F. (2008). L'Internet des objets. Quels enjeux pour les Europ\u00e9ens?.  Benghozi P. J. Bureau S. & Massit-Folea F. (2008). L'Internet des objets. Quels enjeux pour les Europ\u00e9ens?.","DOI":"10.4000\/books.editionsmsh.78"},{"key":"e_1_3_2_1_3_1","volume-title":"L'int\u00e9rnet des objets: Comment l'\u00e9volution actuelle d'Internet transforme-t-elle le monde. Livre Blanc, \u00c9dition: Cisco IBSG, \u00c9tats-Unis","author":"Evans D.","year":"2011","unstructured":"Evans , D. ( 2011 ). L'int\u00e9rnet des objets: Comment l'\u00e9volution actuelle d'Internet transforme-t-elle le monde. Livre Blanc, \u00c9dition: Cisco IBSG, \u00c9tats-Unis . Evans, D. (2011). L'int\u00e9rnet des objets: Comment l'\u00e9volution actuelle d'Internet transforme-t-elle le monde. Livre Blanc, \u00c9dition: Cisco IBSG, \u00c9tats-Unis."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073287"},{"key":"e_1_3_2_1_5_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18), 327--341.","author":"Feng X.","year":"2018","unstructured":"Feng , X. , Li , Q. , Wang , H. , & Sun , L. ( 2018 ). Acquisitional rule-based engine for discovering Internet-of-Things devices . In 27th {USENIX} Security Symposium ({USENIX} Security 18), 327--341. Feng, X., Li, Q., Wang, H., & Sun, L. (2018). Acquisitional rule-based engine for discovering Internet-of-Things devices. In 27th {USENIX} Security Symposium ({USENIX} Security 18), 327--341."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"e_1_3_2_1_7_1","volume-title":"Intelligent semantic web search engines: a brief survey. arXiv preprint arXiv:1102.0831","author":"Madhu G.","year":"2011","unstructured":"Madhu , G. , Govardhan , D. A. , & Rajinikanth , D. T. ( 2011 ). Intelligent semantic web search engines: a brief survey. arXiv preprint arXiv:1102.0831 . Madhu, G., Govardhan, D. A., & Rajinikanth, D. T. (2011). Intelligent semantic web search engines: a brief survey. arXiv preprint arXiv:1102.0831."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340779"},{"key":"e_1_3_2_1_9_1","volume-title":"LLC (2016-02-25).","author":"Matherly J.","year":"2015","unstructured":"Matherly , J. ( 2015 ). Complete guide to shodan. Shodan , LLC (2016-02-25). Matherly, J. (2015). Complete guide to shodan. Shodan, LLC (2016-02-25)."},{"issue":"8","key":"e_1_3_2_1_10_1","first-page":"2996","article-title":"A novel search engine to trace medical information needs using medical domain ontology","volume":"3","author":"Revati M.","year":"2011","unstructured":"Revati , M. , Rao , K. N. , Babu , M. K. , Ramakrishna , K. , & Jacob , C. R. ( 2011 ). A novel search engine to trace medical information needs using medical domain ontology . International Journal on Computer Science and Engineering , 3 ( 8 ), 2996 . Revati, M., Rao, K. N., Babu, M. K., Ramakrishna, K., & Jacob, C. R. (2011). A novel search engine to trace medical information needs using medical domain ontology. International Journal on Computer Science and Engineering, 3(8), 2996.","journal-title":"International Journal on Computer Science and Engineering"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Shah S. H. & Yaqoob I. (2016 August). A survey: Internet of Things (IOT) technologies applications and challenges. In 2016 IEEE Smart Energy Grid Engineering (SEGE) 381--385  Shah S. H. & Yaqoob I. (2016 August). A survey: Internet of Things (IOT) technologies applications and challenges. In 2016 IEEE Smart Energy Grid Engineering (SEGE) 381--385","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1034-0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.12.185"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":13,"alternative-id":["10.1145\/3372938.3372958","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372958","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}