{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:43Z","timestamp":1750309123170,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632551","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust Evaluation in IoT Systems: Extracting User Trust Levels based on Security Profiles in Water Treatment Facilities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2126-8828","authenticated-orcid":false,"given":"Abderrahim","family":"Rafae","sequence":"first","affiliation":[{"name":"Data4earth Laboratory, Sultan Moulay Slimane University, Beni Mellal, MA"},{"name":"GRIC, Sherbrooke University, Sherbrooke, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8863-5628","authenticated-orcid":false,"given":"Aicha","family":"Aiche","sequence":"additional","affiliation":[{"name":"Data4earth laboratory, Sultan Moulay Slimane University, Beni Mellal, Morocco"},{"name":"GRIC, Sherbrooke University, Sherbrooke, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1672-8085","authenticated-orcid":false,"given":"Mohammed","family":"Erritali","sequence":"additional","affiliation":[{"name":"Data4earth laboratory, Sultan Moulay Slimane University, Beni Mellal, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7413-6897","authenticated-orcid":false,"given":"Pierre-Martin","family":"Tardif","sequence":"additional","affiliation":[{"name":"GRIC, Sherbrooke University, Sherbrooke, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/w13010081"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2022.08.015"},{"key":"e_1_3_2_1_3_1","volume-title":"Lyman. The internet of things: An overview. The internet society (ISOC)","author":"Rose Karen","year":"2015","unstructured":"Rose, Karen, Eldridge, Scott, et Chapin, Lyman. The internet of things: An overview. The internet society (ISOC), 2015, vol. 80, p. 1--50."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420075311"},{"key":"e_1_3_2_1_5_1","volume-title":"Biplab. Two-factor authentication for IoT with location information","author":"Aman Muhammad Naveed","year":"2018","unstructured":"Aman, Muhammad Naveed, Basheer, Mohamed Haroon, et SIKDAR, Biplab. Two-factor authentication for IoT with location information. IEEE Internet of Things Journal, 2018, vol. 6, no 2, p. 3335--3351."},{"key":"e_1_3_2_1_6_1","volume-title":"Erik, Hamdioui, Said, et al. Public-key based authentication architecture for IoT devices using PUF. arXiv preprint arXiv:2002.01277","author":"Akhundov Haji","year":"2020","unstructured":"Akhundov, Haji, Van Der Sluis, Erik, Hamdioui, Said, et al. Public-key based authentication architecture for IoT devices using PUF. arXiv preprint arXiv:2002.01277, 2020."},{"key":"e_1_3_2_1_7_1","volume-title":"Digital certificates for the Internet of Things","author":"Forsby Filip","year":"2017","unstructured":"Forsby, Filip. Digital certificates for the Internet of Things. 2017."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"IEEE","author":"Lau Chi Ho","year":"2018","unstructured":"Lau, Chi Ho, ALAN, Kai-Hau Yeung, et YAN, Fan. Blockchain-based authentication in IoT networks. In : 2018 IEEE conference on dependable and secure computing (DSC). IEEE, 2018. p. 1--8."},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"IEEE","author":"Nikolov Nakov","year":"2019","unstructured":"Nikolov, Neven et Nakov, Ognyan. Research of secure communication of Esp32 IoT embedded system to. NET core cloud structure using MQTTS SSL\/TLS. In : 2019 IEEE XXVIII International Scientific Conference Electronics (ET). IEEE, 2019. p. 1--4."},{"key":"e_1_3_2_1_10_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19).","author":"Kumar Sam","year":"2019","unstructured":"Kumar, Sam, HU, Yuncong, Andersen, Michael P., et al. JEDI:Many-to-ManyEnd-to-End Encryption and Key Delegation for IoT. In : 28th USENIX Security Symposium (USENIX Security 19). 2019. p. 1519--1536."},{"key":"e_1_3_2_1_11_1","volume-title":"et al. Poster: Towards encrypted query processing for the Internet of Things. In : Proceedings of the 21st annual international conference on mobile computing and networking","author":"Shafagh Hossein","year":"2015","unstructured":"Shafagh, Hossein, Hithnawi, Anwar, Dr\u00f6scher, Andreas, et al. Poster: Towards encrypted query processing for the Internet of Things. In : Proceedings of the 21st annual international conference on mobile computing and networking. 2015. p. 251--253."},{"key":"e_1_3_2_1_12_1","first-page":"100508","volume-title":"Internet of Things","volume":"18","author":"El Jaouhari Bouvet","year":"2022","unstructured":"El Jaouhari, Saad et Bouvet, Eric. Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions. Internet of Things, 2022, vol. 18, p. 100508."},{"key":"e_1_3_2_1_13_1","volume-title":"ZigBee wireless networks and transceivers. newnes","author":"Farahani Shahin","year":"2011","unstructured":"Farahani, Shahin. ZigBee wireless networks and transceivers. newnes, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2017.57006"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Cluster Computing","author":"Heidari Jabraeil Jamali","year":"2022","unstructured":"Heidari, Arash et Jabraeil Jamali, Mohammad Ali. Internet of Things intrusion detection systems: A comprehensive review and future directions. Cluster Computing, 2022, p. 1--28."},{"key":"e_1_3_2_1_16_1","article-title":"dataset for designing Intrusion Detection Systems","volume":"2018","author":"Panigrahi Borah","year":"2017","unstructured":"Panigrahi, Ranjit et Borah, Samarjeet. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology, 2018, vol. 7, no 3.24, p. 479--482.","journal-title":"International Journal of Engineering & Technology"},{"key":"e_1_3_2_1_17_1","volume-title":"Rajanikanth. Intrusion detection system for the IoT: A comprehensive review. In : Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) 11","author":"Meera Akhil Jabbar","year":"2021","unstructured":"Meera, Akhil Jabbar, Kantipudi, MVV Prasad, et Aluvalu, Rajanikanth. Intrusion detection system for the IoT: A comprehensive review. In : Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) 11. Springer International Publishing, 2021. p. 235--243."},{"key":"e_1_3_2_1_18_1","volume-title":"Weizhi. Intrusion Detection in the Automotive Domain: A Comprehensive Review","author":"Lampe","year":"2023","unstructured":"Lampe, Brooke et Meng, Weizhi. Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Communications Surveys & Tutorials, 2023."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3021385.3021392"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0887-z"},{"key":"e_1_3_2_1_21_1","volume-title":"2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 1--6). IEEE.","author":"Suryani V.","year":"2016","unstructured":"Suryani, V. (2016, October). A survey on trust in Internet of Things. In 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 1--6). IEEE."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843003000681"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571053"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"e_1_3_2_1_26_1","unstructured":"https:\/\/www.kaggle.com\/datasets\/pavansubhasht\/ibm-hr-analytics-attrition-dataset (accessed on 21\/09\/2023)"}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"UCC '23"},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632551","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":26,"alternative-id":["10.1145\/3603166.3632551","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632551","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}