{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:16Z","timestamp":1750220596788,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3415958.3433033","type":"proceedings-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T23:10:58Z","timestamp":1606518658000},"page":"96-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Thing Mutation as a Countermeasure to Safeguard IoT"],"prefix":"10.1145","author":[{"given":"Bita","family":"Banihashemi","sequence":"first","affiliation":[{"name":"Curtin University, Dubai, UAE"}]},{"given":"Zakaria","family":"Maamar","sequence":"additional","affiliation":[{"name":"Zayed University, Dubai, UAE"}]},{"given":"Noura","family":"Faci","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Claude Bernard Lyon 1, Villeurbanne, France"}]},{"given":"Emir","family":"Ugljanin","sequence":"additional","affiliation":[{"name":"State University of Novi Pazar, Novi Pazar, Serbia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model","volume":"9","author":"Abdul-Ghani Hezam Akram","year":"2018","unstructured":"Hezam Akram Abdul-Ghani , Dimitri Konstantas , and Mohammed Mahyoub . 2018 . A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model . International Journal of Advanced Computer Science and Applications 9 , 3 (2018). Hezam Akram Abdul-Ghani, Dimitri Konstantas, and Mohammed Mahyoub. 2018. A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. International Journal of Advanced Computer Science and Applications 9, 3 (2018).","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_2_1","first-page":"88","article-title":"Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning","volume":"4","author":"Azmoodeh Amin","year":"2019","unstructured":"Amin Azmoodeh , Ali Dehghantanha , and Kim-Kwang Raymond Choo . 2019 . Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning . T-SUSC 4 , 1 (2019), 88 -- 95 . https:\/\/doi.org\/10.1109\/TSUSC.2018.2809665 10.1109\/TSUSC.2018.2809665 Amin Azmoodeh, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning. T-SUSC 4, 1 (2019), 88--95. https:\/\/doi.org\/10.1109\/TSUSC.2018.2809665","journal-title":"T-SUSC"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754848"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2215851"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Home Automation Routing Requirements in Low-Power and Lossy Networks","volume":"5826","author":"Brandt Anders","year":"2010","unstructured":"Anders Brandt , Jakob Buron , and Giorgio Porcu . 2010 . Home Automation Routing Requirements in Low-Power and Lossy Networks . RFC 5826 (2010), 1 -- 17 . https:\/\/doi.org\/10.17487\/RFC5826 10.17487\/RFC5826 Anders Brandt, Jakob Buron, and Giorgio Porcu. 2010. Home Automation Routing Requirements in Low-Power and Lossy Networks. RFC 5826 (2010), 1--17. https:\/\/doi.org\/10.17487\/RFC5826","journal-title":"RFC"},{"volume-title":"Internet of Things Security and Privacy","author":"Dabbagh Mehiar","key":"e_1_3_2_1_6_1","unstructured":"Mehiar Dabbagh and Ammar Rayes . 2019. Internet of Things Security and Privacy . Springer International Publishing , Cham , 211--238. Mehiar Dabbagh and Ammar Rayes. 2019. Internet of Things Security and Privacy. Springer International Publishing, Cham, 211--238."},{"key":"e_1_3_2_1_7_1","volume-title":"Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices. Electronics 8, 5","author":"Desnitsky Vasily","year":"2019","unstructured":"Vasily Desnitsky , Igor Kotenko , and Danil Zakoldaev . 2019. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices. Electronics 8, 5 ( 2019 ). Vasily Desnitsky, Igor Kotenko, and Danil Zakoldaev. 2019. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices. Electronics 8, 5 (2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4631545"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006840607590766"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.06.007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mohammad Fouladlou and Ahmad Khademzadeh. 2017. An energy efficient clustering algorithm for Wireless Sensor devices in Internet of Things. In 2017 Artificial Intelligence and Robotics (IRANOPEN). 39--44.  Mohammad Fouladlou and Ahmad Khademzadeh. 2017. An energy efficient clustering algorithm for Wireless Sensor devices in Internet of Things. In 2017 Artificial Intelligence and Robotics (IRANOPEN). 39--44.","DOI":"10.1109\/RIOS.2017.7956441"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754816"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876092"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2019.131919"},{"key":"e_1_3_2_1_15_1","unstructured":"Farzad Kamrani Mikael Wedlin and Ioana Rodhe. 2016. Internet of Things: Security and Privacy Issues. Report FOI-R-4362-SE. FOI.  Farzad Kamrani Mikael Wedlin and Ioana Rodhe. 2016. Internet of Things: Security and Privacy Issues. Report FOI-R-4362-SE. FOI."},{"volume-title":"Core Molecular Modeling","author":"Leach A.R.","key":"e_1_3_2_1_16_1","unstructured":"A.R. Leach . 2007. 4.05 - Ligand-Based Approaches : Core Molecular Modeling . In Comprehensive Medicinal Chemistry II, John B. Taylor and David J. Triggle (Eds.). Elsevier , Oxford , 87--118. https:\/\/doi.org\/10.1016\/B0-08-045044-X\/00246-7 10.1016\/B0-08-045044-X A.R. Leach. 2007. 4.05 - Ligand-Based Approaches: Core Molecular Modeling. In Comprehensive Medicinal Chemistry II, John B. Taylor and David J. Triggle (Eds.). Elsevier, Oxford, 87--118. https:\/\/doi.org\/10.1016\/B0-08-045044-X\/00246-7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.168"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.66"},{"key":"e_1_3_2_1_19_1","volume-title":"Model and Data Engineering - 8th International Conference, MEDI","author":"Maamar Zakaria","year":"2018","unstructured":"Zakaria Maamar , Khouloud Boukadi , Emir Ugljanin , Thar Baker , Muhammad Asim , Mohammed Al-Khafajiy , Djamal Benslimane , and Hasna El Alaoui El Abdallaoui . 2018. Thing Federation as a Service: Foundations and Demonstration . In Model and Data Engineering - 8th International Conference, MEDI 2018 , Marrakesh, Morocco, October 24-26, 2018, Proceedings (Lecture Notes in Computer Science), El Hassan Abdelwahed, Ladjel Bellatreche, Matteo Golfarelli, Dominique M\u00e9ry, and Carlos Ordonez (Eds.), Vol. 11163 . Springer , 184--197. https:\/\/doi.org\/10.1007\/978-3-030-00856-7_12 10.1007\/978-3-030-00856-7_12 Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui. 2018. Thing Federation as a Service: Foundations and Demonstration. In Model and Data Engineering - 8th International Conference, MEDI 2018, Marrakesh, Morocco, October 24-26, 2018, Proceedings (Lecture Notes in Computer Science), El Hassan Abdelwahed, Ladjel Bellatreche, Matteo Golfarelli, Dominique M\u00e9ry, and Carlos Ordonez (Eds.), Vol. 11163. Springer, 184--197. https:\/\/doi.org\/10.1007\/978-3-030-00856-7_12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS48598.2019.9188186"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/977406.978701"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"e_1_3_2_1_23_1","volume-title":"Jamming in the Internet of Things: A Game-Theoretic Perspective. In 2016 IEEE Global Communications Conference, GLOBECOM 2016","author":"Namvar Nima","year":"2016","unstructured":"Nima Namvar , Walid Saad , Niloofar Bahadori , and Brian Kelley . 2016 . Jamming in the Internet of Things: A Game-Theoretic Perspective. In 2016 IEEE Global Communications Conference, GLOBECOM 2016 , Washington, DC, USA , December 4-8, 2016. IEEE, 1--6. https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841922 10.1109\/GLOCOM.2016.7841922 Nima Namvar, Walid Saad, Niloofar Bahadori, and Brian Kelley. 2016. Jamming in the Internet of Things: A Game-Theoretic Perspective. In 2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016. IEEE, 1--6. https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841922"},{"key":"#cr-split#-e_1_3_2_1_24_1.1","unstructured":"M. Ogata J. Franklin J. Voas V. Sritapan and S. Quirolgico. April 2019. Vetting the Security of Mobile Applications. https:\/\/doi.org\/10.6028\/NIST.SP.800- 163r1 DRAFT NIST Special Publication 800-163 (Revision 1). [Online accessed 20-March-2020]. 10.6028\/NIST.SP.800-"},{"key":"#cr-split#-e_1_3_2_1_24_1.2","doi-asserted-by":"crossref","unstructured":"M. Ogata J. Franklin J. Voas V. Sritapan and S. Quirolgico. April 2019. Vetting the Security of Mobile Applications. https:\/\/doi.org\/10.6028\/NIST.SP.800- 163r1 DRAFT NIST Special Publication 800-163 (Revision 1). [Online accessed 20-March-2020].","DOI":"10.6028\/NIST.SP.800-163r1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACC.2011.5978933"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2893674"},{"key":"e_1_3_2_1_27_1","volume-title":"UCET 2019","author":"Qureshi Ul-Haq","year":"2019","unstructured":"Ayyaz- Ul-Haq Qureshi , Hadi Larijani , Abbas Javed , Nhamoinesu Mtetwa , and Jawad Ahmad . 2019 . Intrusion Detection Using Swarm Intelligence. In UK\/China Emerging Technologies , UCET 2019 , Glasgow, UK , August 21-22, 2019. IEEE, 1--5. https:\/\/doi.org\/10.1109\/UCET.2019.8881840 10.1109\/UCET.2019.8881840 Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Abbas Javed, Nhamoinesu Mtetwa, and Jawad Ahmad. 2019. Intrusion Detection Using Swarm Intelligence. In UK\/China Emerging Technologies, UCET 2019, Glasgow, UK, August 21-22, 2019. IEEE, 1--5. https:\/\/doi.org\/10.1109\/UCET.2019.8881840"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02945-z"},{"key":"e_1_3_2_1_29_1","volume-title":"24th Symposium on Information Theory Benelux. 195--202","author":"Seys Stefaan","year":"2003","unstructured":"Stefaan Seys and Bart Preneel . 2003 . Authenticated and efficient key management for wireless ad hoc networks . In 24th Symposium on Information Theory Benelux. 195--202 . Stefaan Seys and Bart Preneel. 2003. Authenticated and efficient key management for wireless ad hoc networks. In 24th Symposium on Information Theory Benelux. 195--202."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-007-9053-9"},{"key":"e_1_3_2_1_31_1","volume-title":"Zhang","author":"Simoncini David","year":"2019","unstructured":"David Simoncini and Kam Y.J . Zhang . 2019 . Population-Based Sampling and Fragment-Based De Novo Protein Structure Prediction. In Encyclopedia of Bioinformatics and Computational Biology, Shoba Ranganathan, Michael Gribskov, Kenta Nakai, and Christian Sch\u00c3\u016dnbach (Eds.). Academic Press , Oxford, 774--784. https:\/\/doi.org\/10.1016\/B978-0-12-809633-8.20507-4 10.1016\/B978-0-12-809633-8.20507-4 David Simoncini and Kam Y.J. Zhang. 2019. Population-Based Sampling and Fragment-Based De Novo Protein Structure Prediction. In Encyclopedia of Bioinformatics and Computational Biology, Shoba Ranganathan, Michael Gribskov, Kenta Nakai, and Christian Sch\u00c3\u016dnbach (Eds.). Academic Press, Oxford, 774--784. https:\/\/doi.org\/10.1016\/B978-0-12-809633-8.20507-4"},{"key":"e_1_3_2_1_32_1","volume-title":"Sloss and Steven Gustafson","author":"Andrew","year":"2019","unstructured":"Andrew N. Sloss and Steven Gustafson . 2019 . 2019 Evolutionary Algorithms Review. CoRR abs\/1906.08870 (2019). arXiv:1906.08870 http:\/\/arxiv.org\/abs\/1906.08870 Andrew N. Sloss and Steven Gustafson. 2019. 2019 Evolutionary Algorithms Review. CoRR abs\/1906.08870 (2019). arXiv:1906.08870 http:\/\/arxiv.org\/abs\/1906.08870"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1644490.1644491"},{"key":"e_1_3_2_1_34_1","volume-title":"Bakshi Rohit Prasad, and Sonali Agarawal.","author":"Verma Maneesh Kumar","year":"2019","unstructured":"Maneesh Kumar Verma , Shankar Yadav , Bhoopesh Kumar Goyal , Bakshi Rohit Prasad, and Sonali Agarawal. 2019 . Phishing Website Detection Using Neural Network and Deep Belief Network. In Recent Findings in Intelligent Computing Techniques, Pankaj Kumar Sa, Sambit Bakshi, Ioannis K. Hatzilygeroudis, and Manmath Narayan Sahoo (Eds.). Springer Singapore , Singapore, 293--300. Maneesh Kumar Verma, Shankar Yadav, Bhoopesh Kumar Goyal, Bakshi Rohit Prasad, and Sonali Agarawal. 2019. Phishing Website Detection Using Neural Network and Deep Belief Network. In Recent Findings in Intelligent Computing Techniques, Pankaj Kumar Sa, Sambit Bakshi, Ioannis K. Hatzilygeroudis, and Manmath Narayan Sahoo (Eds.). Springer Singapore, Singapore, 293--300."},{"key":"e_1_3_2_1_35_1","volume-title":"Wireless sensor network security: A survey. Security in Distributed, Grid, and Pervasive Computing","author":"Walters John Paul","year":"2007","unstructured":"John Paul Walters , Zhengqiang Liang , Weisong Shi , and Vishwamitra Chaudhary . 2007. Wireless sensor network security: A survey. Security in Distributed, Grid, and Pervasive Computing ( 2007 ). John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vishwamitra Chaudhary. 2007. Wireless sensor network security: A survey. Security in Distributed, Grid, and Pervasive Computing (2007)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"}],"event":{"name":"MEDES '20: 12th International Conference on Management of Digital EcoSystems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event United Arab Emirates","acronym":"MEDES '20"},"container-title":["Proceedings of the 12th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415958.3433033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3415958.3433033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:53Z","timestamp":1750195913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415958.3433033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":37,"alternative-id":["10.1145\/3415958.3433033","10.1145\/3415958"],"URL":"https:\/\/doi.org\/10.1145\/3415958.3433033","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-11-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}