{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:01:55Z","timestamp":1775667715614,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["iBlockchain"],"award-info":[{"award-number":["iBlockchain"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["952697"],"award-info":[{"award-number":["952697"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119"],"award-info":[{"award-number":["CRC 1119"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["309195"],"award-info":[{"award-number":["309195"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Intel Collaborative Research Institute for Collaborative Autonomous & Resilient Systems"},{"name":"European Space Operations Centre with the Networking\/Partnering Initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471868","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"220-234","source":"Crossref","is-referenced-by-count":1,"title":["GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks"],"prefix":"10.1145","author":[{"given":"Tigist","family":"Abera","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Ferdinand","family":"Brasser","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Lachlan","family":"Gunn","sequence":"additional","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Patrick","family":"Jauernig","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"David","family":"Koisser","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3GPP. 2020. 5G Standard \u2013 Release 16. https:\/\/www.3gpp.org\/release-16.  3GPP. 2020. 5G Standard \u2013 Release 16. https:\/\/www.3gpp.org\/release-16."},{"key":"e_1_3_2_1_2_1","unstructured":"5G Automotive Association. 2016. C-V2X White Paper: The Case for Cellular V2X for Safety and Cooperative Driving. https:\/\/5gaa.org\/news\/white-paper-placeholder-news-for-testing\/.  5G Automotive Association. 2016. C-V2X White Paper: The Case for Cellular V2X for Safety and Cooperative Driving. https:\/\/5gaa.org\/news\/white-paper-placeholder-news-for-testing\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_4_1","volume-title":"DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In Annual Network and Distributed System Security Symposium.","author":"Abera Tigist","year":"2019","unstructured":"Tigist Abera , Raad Bahmani , Ferdinand Brasser , Ahmad Ibrahim , Ahmad-Reza Sadeghi , and Matthias Schunter . 2019 . DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In Annual Network and Distributed System Security Symposium. Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"Control Behavior Integrity for Distributed Cyber-Physical Systems. In 11th IEEE\/ACM Conference on Cyber-Physical Systems (ICCPS).","author":"Adepu Sridhar","year":"2020","unstructured":"Sridhar Adepu , Ferdinand Brasser , Luis Garcia , Michael Rodler , Lucas Davi , Ahmad-Reza Sadeghi , and Saman Zonouz . 2020 . Control Behavior Integrity for Distributed Cyber-Physical Systems. In 11th IEEE\/ACM Conference on Cyber-Physical Systems (ICCPS). Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, and Saman Zonouz. 2020. Control Behavior Integrity for Distributed Cyber-Physical Systems. In 11th IEEE\/ACM Conference on Cyber-Physical Systems (ICCPS)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589107"},{"key":"e_1_3_2_1_8_1","unstructured":"ARM. 2021. Solutions - Automotive. https:\/\/www.arm.com\/solutions\/automotive.  ARM. 2021. Solutions - Automotive. https:\/\/www.arm.com\/solutions\/automotive."},{"key":"e_1_3_2_1_9_1","unstructured":"ARM Limited. 2008. ARM Security Technology Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/genc009492\/c.  ARM Limited. 2008. ARM Security Technology Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/genc009492\/c."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_11_1","volume-title":"Leakage-Resilient Layout Randomization for Mobile Devices. In Annual Network and Distributed System Security Symposium.","author":"Braden Kjell","year":"2016","unstructured":"Kjell Braden , Stephen Crane , Lucas Davi , Michael Franz , Per Larsen , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2016 . Leakage-Resilient Layout Randomization for Mobile Devices. In Annual Network and Distributed System Security Symposium. Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0474-5"},{"key":"e_1_3_2_1_13_1","volume-title":"A survey of intrusion detection systems in wireless sensor networks","author":"Butun Ismail","year":"2013","unstructured":"Ismail Butun , Salvatore\u00a0 D Morgera , and Ravi Sankar . 2013. A survey of intrusion detection systems in wireless sensor networks . IEEE communications surveys & tutorials 16, 1 ( 2013 ), 266\u2013282. Ismail Butun, Salvatore\u00a0D Morgera, and Ravi Sankar. 2013. A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials 16, 1 (2013), 266\u2013282."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_17_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium.","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , and Stefan Savage . 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium."},{"key":"e_1_3_2_1_18_1","unstructured":"Eric Chien Liam OMurchu and Nicolas Falliere. 2011. W32.Duqu - The precursor to the next Stuxnet. Technical Report. Symantic Security Response.  Eric Chien Liam OMurchu and Nicolas Falliere. 2011. W32.Duqu - The precursor to the next Stuxnet. Technical Report. Symantic Security Response."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2495213"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_24_1","volume-title":"International conference on advanced intelligent systems and informatics. Springer, 151\u2013160","author":"Elsayed Walaa","year":"2017","unstructured":"Walaa Elsayed , Mohamed Elhoseny , Alaa\u00a0Mohamed Riad , and Aboul\u00a0Ella Hassanien . 2017 . Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks . In International conference on advanced intelligent systems and informatics. Springer, 151\u2013160 . Walaa Elsayed, Mohamed Elhoseny, Alaa\u00a0Mohamed Riad, and Aboul\u00a0Ella Hassanien. 2017. Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In International conference on advanced intelligent systems and informatics. Springer, 151\u2013160."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340685"},{"key":"e_1_3_2_1_26_1","unstructured":"F-Secure Labs. 2016. BLACKENERGY and QUEDAGH: The convergence of crimeware and APT attacks.  F-Secure Labs. 2016. BLACKENERGY and QUEDAGH: The convergence of crimeware and APT attacks."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"key":"e_1_3_2_1_28_1","first-page":"29","article-title":"W32.stuxnet dossier. White paper, Symantec Corp","volume":"5","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere , Liam\u00a0 O Murchu , and Eric Chien . 2011 . W32.stuxnet dossier. White paper, Symantec Corp ., Security Response 5 , 6 (2011), 29 . Nicolas Falliere, Liam\u00a0O Murchu, and Eric Chien. 2011. W32.stuxnet dossier. White paper, Symantec Corp., Security Response 5, 6 (2011), 29.","journal-title":"Security Response"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lien Francillon Quan Nguyen Kasper\u00a0B. Rasmussen and Gene Tsudik. 2014. A Minimalist Approach to Remote Attestation. In Design Automation & Test in Europe.  Aur\u00e9lien Francillon Quan Nguyen Kasper\u00a0B. Rasmussen and Gene Tsudik. 2014. A Minimalist Approach to Remote Attestation. In Design Automation & Test in Europe.","DOI":"10.7873\/DATE2014.257"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_32_1","volume-title":"Avoidance of misbehaving nodes in wireless mesh networks. Security and Communication Networks 7, 7","author":"Grinshpoun Tal","year":"2014","unstructured":"Tal Grinshpoun , Amnon Meisels , and Eyal Felstaine . 2014. Avoidance of misbehaving nodes in wireless mesh networks. Security and Communication Networks 7, 7 ( 2014 ). Tal Grinshpoun, Amnon Meisels, and Eyal Felstaine. 2014. Avoidance of misbehaving nodes in wireless mesh networks. Security and Communication Networks 7, 7 (2014)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380552"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. 135\u2013147","author":"Wenke Lee Huang","year":"2003","unstructured":"Yi-an Huang and Wenke Lee . 2003 . A cooperative intrusion detection system for ad hoc networks . In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. 135\u2013147 . Yi-an Huang and Wenke Lee. 2003. A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. 135\u2013147."},{"key":"e_1_3_2_1_36_1","unstructured":"Hyperledger. 2020. Hyperledger Sawtooth Documentation on Proof-of-Elapsed-Time. https:\/\/sawtooth.hyperledger.org\/docs\/core\/nightly\/0-8\/introduction.html.  Hyperledger. 2020. Hyperledger Sawtooth Documentation on Proof-of-Elapsed-Time. https:\/\/sawtooth.hyperledger.org\/docs\/core\/nightly\/0-8\/introduction.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098260"},{"key":"e_1_3_2_1_39_1","unstructured":"IEEE. 2010. IEEE 802.11p-2010: Extensions to IEEE Std 802.11 for wireless local area networks (WLANs) providing wireless communications while in a vehicular environment.https:\/\/standards.ieee.org\/standard\/802_11p-2010.html.  IEEE. 2010. IEEE 802.11p-2010: Extensions to IEEE Std 802.11 for wireless local area networks (WLANs) providing wireless communications while in a vehicular environment.https:\/\/standards.ieee.org\/standard\/802_11p-2010.html."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of the 13th European Wireless Conference. Citeseer, 1\u201310","author":"Ioannis Krontiris","year":"2007","unstructured":"Krontiris Ioannis , Tassos Dimitriou , and Felix\u00a0 C Freiling . 2007 . Towards intrusion detection in wireless sensor networks . In Proc. of the 13th European Wireless Conference. Citeseer, 1\u201310 . Krontiris Ioannis, Tassos Dimitriou, and Felix\u00a0C Freiling. 2007. Towards intrusion detection in wireless sensor networks. In Proc. of the 13th European Wireless Conference. Citeseer, 1\u201310."},{"key":"e_1_3_2_1_41_1","volume-title":"11th International Conference on ITS Telecommunications.","author":"Jaeger A.","year":"2011","unstructured":"A. Jaeger and S.\u00a0 A. Huss . 2011 . The weather hazard warning in simTD: A design for road weather related warnings in a large scale Car-to-X field operational test . In 11th International Conference on ITS Telecommunications. A. Jaeger and S.\u00a0A. Huss. 2011. The weather hazard warning in simTD: A design for road weather related warnings in a large scale Car-to-X field operational test. In 11th International Conference on ITS Telecommunications."},{"key":"e_1_3_2_1_42_1","unstructured":"Michel\u00a0E. Kabay. 2010. Attacks on Power Systems: Hackers Malware. https:\/\/www.networkworld.com\/article\/2217684\/attacks-on-power-systems--hackers--malware.html.  Michel\u00a0E. Kabay. 2010. Attacks on Power Systems: Hackers Malware. https:\/\/www.networkworld.com\/article\/2217684\/attacks-on-power-systems--hackers--malware.html."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_45_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios\u00a0Kokoris","year":"2016","unstructured":"Eleftherios\u00a0Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium (USENIX Security 16) . 279\u2013296. Eleftherios\u00a0Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16). 279\u2013296."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196544"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_49_1","volume-title":"Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless networks 8, 2\/3","author":"Kulik Joanna","year":"2002","unstructured":"Joanna Kulik , Wendi Heinzelman , and Hari Balakrishnan . 2002. Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless networks 8, 2\/3 ( 2002 ), 169\u2013185. Joanna Kulik, Wendi Heinzelman, and Hari Balakrishnan. 2002. Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless networks 8, 2\/3 (2002), 169\u2013185."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910865"},{"key":"e_1_3_2_1_52_1","unstructured":"Linaro Inc.2021. OP-TEE Documentation. https:\/\/optee.readthedocs.io\/en\/latest\/.  Linaro Inc.2021. OP-TEE Documentation. https:\/\/optee.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Jian Liu Wenting Li Ghassan\u00a0O. Karame and N. Asokan. 2018. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. IEEE Trans. Comput. (2018). https:\/\/doi.org\/10.1109\/TC.2018.2860009  Jian Liu Wenting Li Ghassan\u00a0O. Karame and N. Asokan. 2018. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. IEEE Trans. Comput. (2018). https:\/\/doi.org\/10.1109\/TC.2018.2860009","DOI":"10.1109\/TC.2018.2860009"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086439.3086443"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519080"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Navamani\u00a0Thandava Meganathan and Yogesh Palanichamy. 2014. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks. The Scientific World Journal(2014).  Navamani\u00a0Thandava Meganathan and Yogesh Palanichamy. 2014. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks. The Scientific World Journal(2014).","DOI":"10.1155\/2015\/636590"},{"key":"e_1_3_2_1_58_1","unstructured":"Charlie Miller and Christopher Valasek. 2014. A Survey of Remote Automotive Attack Surfaces. In Blackhat USA.  Charlie Miller and Christopher Valasek. 2014. A Survey of Remote Automotive Attack Surfaces. In Blackhat USA."},{"key":"e_1_3_2_1_59_1","unstructured":"OneWeb. 2021. OneWeb Home Page. https:\/\/www.oneweb.world\/.  OneWeb. 2021. OneWeb Home Page. https:\/\/www.oneweb.world\/."},{"key":"e_1_3_2_1_60_1","unstructured":"OpenSim Ltd.2021. OMNeT++ Discrete Event Simulator. http:\/\/omnetpp.org\/.  OpenSim Ltd.2021. OMNeT++ Discrete Event Simulator. http:\/\/omnetpp.org\/."},{"key":"e_1_3_2_1_61_1","volume-title":"Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization. In IEEE Symposium on Security and Privacy.","author":"Pappas Vasilis","year":"2012","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos\u00a0 D. Keromytis . 2012 . Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization. In IEEE Symposium on Security and Privacy. Vasilis Pappas, Michalis Polychronakis, and Angelos\u00a0D. Keromytis. 2012. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_62_1","unstructured":"PaX Team. 2001. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX Team. 2001. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_63_1","unstructured":"Jonathan Pollet and Joe Cummins. 2010. Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters. In Blackhat USA.  Jonathan Pollet and Joe Cummins. 2010. Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters. In Blackhat USA."},{"key":"e_1_3_2_1_64_1","unstructured":"Jerome Radcliffe. 2011. Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System. In Blackhat USA.  Jerome Radcliffe. 2011. Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System. In Blackhat USA."},{"key":"e_1_3_2_1_65_1","unstructured":"Raspberry Pi Foundation. 2021. Raspberry Pi 3 Model B+. https:\/\/static.raspberrypi.org\/files\/product-briefs\/Raspberry-Pi-Model-Bplus-Product-Brief.pdf.  Raspberry Pi Foundation. 2021. Raspberry Pi 3 Model B+. https:\/\/static.raspberrypi.org\/files\/product-briefs\/Raspberry-Pi-Model-Bplus-Product-Brief.pdf."},{"key":"e_1_3_2_1_66_1","volume-title":"SAKE: Software Attestation for Key Establishment in Sensor Networks. In Distributed Computing in Sensor Systems.","author":"Seshadri Arvind","year":"2008","unstructured":"Arvind Seshadri , Mark Luk , and Adrian Perrig . 2008 . SAKE: Software Attestation for Key Establishment in Sensor Networks. In Distributed Computing in Sensor Systems. Arvind Seshadri, Mark Luk, and Adrian Perrig. 2008. SAKE: Software Attestation for Key Establishment in Sensor Networks. In Distributed Computing in Sensor Systems."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2051556"},{"key":"e_1_3_2_1_68_1","volume-title":"IEEE International Conference on Industrial Engineering and Engineering Management.","author":"Shrouf F.","unstructured":"F. Shrouf , J. Ordieres , and G. Miragliotta . 2014. Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm . In IEEE International Conference on Industrial Engineering and Engineering Management. F. Shrouf, J. Ordieres, and G. Miragliotta. 2014. Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. In IEEE International Conference on Industrial Engineering and Engineering Management."},{"key":"e_1_3_2_1_69_1","unstructured":"Meital\u00a0Ben Sinai Nimrod Partush Shir Yadid and Eran Yahav. 2015. Exploiting Social Navigation. In Blackhat Asia.  Meital\u00a0Ben Sinai Nimrod Partush Shir Yadid and Eran Yahav. 2015. Exploiting Social Navigation. In Blackhat Asia."},{"key":"e_1_3_2_1_70_1","unstructured":"Slash Gear. 2019. The 2020 VW Golf 8 could make smart cars mass-market. https:\/\/www.slashgear.com\/2020-volkswagen-golf-8-car2x-v2v-smart-cars-mass-market-25597350\/.  Slash Gear. 2019. The 2020 VW Golf 8 could make smart cars mass-market. https:\/\/www.slashgear.com\/2020-volkswagen-golf-8-car2x-v2v-smart-cars-mass-market-25597350\/."},{"key":"e_1_3_2_1_71_1","unstructured":"SpaceX. 2021. Starlink Mission. https:\/\/www.starlink.com\/.  SpaceX. 2021. Starlink Mission. https:\/\/www.starlink.com\/."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_3_2_1_74_1","unstructured":"The Conversation. 2018. Connected cars can lie posing a new threat to smart cities. http:\/\/theconversation.com\/connected-cars-can-lie-posing-a-new-threat-to-smart-cities-95339.  The Conversation. 2018. Connected cars can lie posing a new threat to smart cities. http:\/\/theconversation.com\/connected-cars-can-lie-posing-a-new-threat-to-smart-cities-95339."},{"key":"e_1_3_2_1_75_1","unstructured":"The Guardian. 2011. DigiNotar SSL certificate hack amounts to cyberwar says expert. https:\/\/www.theguardian.com\/technology\/2011\/sep\/05\/diginotar-certificate-hack-cyberwar.  The Guardian. 2011. DigiNotar SSL certificate hack amounts to cyberwar says expert. https:\/\/www.theguardian.com\/technology\/2011\/sep\/05\/diginotar-certificate-hack-cyberwar."},{"key":"e_1_3_2_1_76_1","unstructured":"The Guardian. 2016. DDoS attack that disrupted internet was largest of its kind in history experts say. https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet.  The Guardian. 2016. DDoS attack that disrupted internet was largest of its kind in history experts say. https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet."},{"key":"e_1_3_2_1_77_1","unstructured":"Chai\u00a0K Toh. 2001. Ad hoc mobile wireless networks: protocols and systems. Pearson Education.  Chai\u00a0K Toh. 2001. Ad hoc mobile wireless networks: protocols and systems. Pearson Education."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"G.\u00a0S. Veronese M. Correia A.\u00a0N. Bessani L.\u00a0C. Lung and P. Verissimo. 2013. Efficient Byzantine Fault-Tolerance. 62 (Jan 2013) 16\u201330. https:\/\/doi.org\/10.1109\/TC.2011.221  G.\u00a0S. Veronese M. Correia A.\u00a0N. Bessani L.\u00a0C. Lung and P. Verissimo. 2013. Efficient Byzantine Fault-Tolerance. 62 (Jan 2013) 16\u201330. https:\/\/doi.org\/10.1109\/TC.2011.221","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_80_1","unstructured":"ZDNet. 2016. How hackers attacked Ukraine\u2019s power grid: Implications for Industrial IoT security. https:\/\/www.zdnet.com\/article\/how-hackers-attacked-ukraines-power-grid-implications-for-industrial-iot-security\/.  ZDNet. 2016. How hackers attacked Ukraine\u2019s power grid: Implications for Industrial IoT security. https:\/\/www.zdnet.com\/article\/how-hackers-attacked-ukraines-power-grid-implications-for-industrial-iot-security\/."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","location":"San Sebastian Spain","acronym":"RAID '21"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":81,"alternative-id":["10.1145\/3471621.3471868","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471868","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}