{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:21:11Z","timestamp":1771467671058,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3591365.3592945","type":"proceedings-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T16:07:29Z","timestamp":1688486849000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0934-0995","authenticated-orcid":false,"given":"A. S. M. Sanwar","family":"Hosen","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence and Big Data, Woosong University, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6620-9083","authenticated-orcid":false,"given":"Pradip Kumar","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computing Science, University of Aberdeen, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-278X","authenticated-orcid":false,"given":"Deepak","family":"Puthal","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3936-1116","authenticated-orcid":false,"given":"In-Ho","family":"Ra","sequence":"additional","affiliation":[{"name":"School of Software, Kunsan National University, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4923-8565","authenticated-orcid":false,"given":"Gi Hwan","family":"Cho","sequence":"additional","affiliation":[{"name":"Division of Computer Science and Engineering, Jeonbuk National University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3009103"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485130"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090779"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011286"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3100622"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3123260"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3139609"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022194"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3142030"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084753"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004486"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051602"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030530"},{"key":"e_1_3_2_1_15_1","volume-title":"Mahmoud","author":"Ullah Imtiaz","year":"2021","unstructured":"Imtiaz Ullah and Qusay H . Mahmoud . 2021 . IoT-Botnet Dataset . Available online: https:\/\/sites.google.com\/view\/iotbotnetdataset (accessed on 1 April 2021). Imtiaz Ullah and Qusay H. Mahmoud. 2021. IoT-Botnet Dataset. Available online: https:\/\/sites.google.com\/view\/iotbotnetdataset (accessed on 1 April 2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101954"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","unstructured":"Nour Moustafa. 2019. ToN_IoT. IEEE Dataport. doi: https:\/\/dx.doi.org\/10.21227\/fesz-dm97. 10.21227\/fesz-dm97"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","unstructured":"Nour Moustafa. 2019. ToN_IoT. IEEE Dataport. doi: https:\/\/dx.doi.org\/10.21227\/fesz-dm97."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3015026"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094024"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800479"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the SAI International System Conference.","volume":"1250","author":"Alkadi Osama","year":"2020","unstructured":"Osama Alkadi , Nour Moustafa , and Benjamin Turnbull . 2020 . A collaborative intrusion detection system using deep blockchain framework for securing cloud networks . In Proceedings of the SAI International System Conference. Vol. 1250 . Springer-Verlog, New Work, NY, 553\u2013565. Osama Alkadi, Nour Moustafa, and Benjamin Turnbull. 2020. A collaborative intrusion detection system using deep blockchain framework for securing cloud networks. In Proceedings of the SAI International System Conference. Vol. 1250. Springer-Verlog, New Work, NY, 553\u2013565."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3053842"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957140"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996590"},{"key":"e_1_3_2_1_26_1","first-page":"4404","article-title":"A deep learning based blockchain mechanism for secure internet of drones environment","volume":"22","author":"Singh Maninderpal","year":"2021","unstructured":"Maninderpal Singh , Gagangeet Singh Aujla , and Rasmeet Singh Bali . 2021 . A deep learning based blockchain mechanism for secure internet of drones environment . IEEE Transactions on Network Science and Engineering 22 , 17 (2021), 4404 \u2013 4413 . DOI: 10.1109\/TITS.2020.2997469 10.1109\/TITS.2020.2997469 Maninderpal Singh, Gagangeet Singh Aujla, and Rasmeet Singh Bali. 2021. A deep learning based blockchain mechanism for secure internet of drones environment. IEEE Transactions on Network Science and Engineering 22, 17 (2021), 4404\u20134413. DOI: 10.1109\/TITS.2020.2997469","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"e_1_3_2_1_27_1","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial internet of things","volume":"14","author":"Li Zhetao","year":"2018","unstructured":"Zhetao Li , Jiawen Kang , Rong Yu , Dongdong Ye , Qingyong Deng , and Yan Zhang . 2018 . Consortium blockchain for secure energy trading in industrial internet of things . IEEE Transactions on Industrial Informatics 14 , 8 (2018), 3690 \u2013 3700 . DOI: 10.1109\/TII.2017.2786307 10.1109\/TII.2017.2786307 Zhetao Li, Jiawen Kang, Rong Yu, Dongdong Ye, Qingyong Deng, and Yan Zhang. 2018. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3690\u20133700. DOI: 10.1109\/TII.2017.2786307","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00011"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC46988.2019.1570548268"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the Third International Symposium on Advanced Security on Software and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591365.3592945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3591365.3592945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:22Z","timestamp":1750178842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591365.3592945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":31,"alternative-id":["10.1145\/3591365.3592945","10.1145\/3591365"],"URL":"https:\/\/doi.org\/10.1145\/3591365.3592945","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}