{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T04:45:10Z","timestamp":1766551510401,"version":"build-2065373602"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>Industrial control systems (ICSs) consist of a large number of control applications that are associated with periodic real-time flows with hard deadlines. To facilitate large-scale integration, remote control, and co-ordination, wireless sensor and actuator networks form the main communication framework in most ICSs. Among the existing wireless sensor and actuator network protocols, WirelessHART is the most suitable protocol for real-time applications in ICSs. The communications in a WirelessHART network are time-division multiple access based. To satisfy the hard deadlines of the real-time flows, the schedule in a WirelessHART network is pre-computed. The same schedule is repeated over every hyperperiod (i.e., lowest common multiple of the periods of the flows). However, a malicious attacker can exploit the repetitive behavior of the flow schedules to launch timing attacks (e.g., selective jamming attacks). To mitigate timing attacks, we propose an online distributed schedule randomization strategy that randomizes the time-slots in the schedules at each network device without violating the flow deadlines, while ensuring the closed-loop control stability. To increase the extent of randomization in the schedules further, and to reduce the energy consumption of the system, we incorporate a period adaptation strategy that adjusts the transmission periods of the flows depending on the stability of the control loops at runtime. We use Kullback-Leibler divergence and prediction probability of slots as two metrics to evaluate the performance of our proposed strategy. We compare our strategy with an offline centralized schedule randomization strategy. Experimental results show that the schedules generated by our strategy are 10% to 15% more diverse and 5% to 10% less predictable on average compared to the offline strategy when the number of base schedules and keys vary between 4 and 6 and 12 and 32, respectively, under all slot utilization (number of occupied slots in a hyperperiod). On incorporating period adaptation, the divergence in the schedules reduceat each period increase with 46% less power consumption on average.<\/jats:p>","DOI":"10.1145\/3624584","type":"journal-article","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T10:22:44Z","timestamp":1694859764000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6154-7673","authenticated-orcid":false,"given":"Ankita","family":"Samaddar","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9628-3847","authenticated-orcid":false,"given":"Arvind","family":"Easwaran","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,11,9]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2009.40"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2013.6700049"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-319-51966-1_15","volume-title":"Foundations and Practice of Security","author":"Bayou Lyes","year":"2017","unstructured":"Lyes Bayou, David Espes, Nora Cuppens-Boulahia, and Fr\u00e9d\u00e9ric Cuppens. 2017. Security analysis of WirelessHART communication scheme. In Foundations and Practice of Security. Springer International, Cham, Switzerland, 223\u2013238."},{"key":"e_1_3_1_5_2","volume-title":"Proceedings of the 10th International Conference on Real-Time and Embedded Computing Systems and Applications","author":"Cervin A.","year":"2004","unstructured":"A. Cervin, B. Lincoln, J. Eker, K. \u00c5rz\u00e9n, and G. Buttazzo. 2004. The jitter margin and its application in the design of real-time control systems. In Proceedings of the 10th International Conference on Real-Time and Embedded Computing Systems and Applications."},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/ICIT.2014.6895027","volume-title":"Proceedings of the 2014 IEEE International Conference on Industrial Technology (ICIT \u201914)","author":"Chen Deji","year":"2014","unstructured":"Deji Chen, Mark Nixon, Song Han, Aloysius K. Mok, and Xiuming Zhu. 2014. WirelessHART and IEEE 802.15.4e. In Proceedings of the 2014 IEEE International Conference on Industrial Technology (ICIT \u201914). 760\u2013765. DOI:10.1109\/ICIT.2014.6895027"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310075"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488805"},{"key":"e_1_3_1_9_2","first-page":"10","volume-title":"Proceedings of the 2005 American Control Conference.","author":"Christofides P. D.","year":"2005","unstructured":"P. D. Christofides. 2005. Control of nonlinear distributed process systems. In Proceedings of the 2005 American Control Conference.10\u201311. DOI:10.1109\/ACC.2005.1469892"},{"key":"e_1_3_1_10_2","unstructured":"Mohammed Dahleh Munther A. Dahleh and George C. Verghese. 2004. Lectures on Dynamic Systems and Control. Retrieved September 21 2023 from https:\/\/viterbi-web.usc.edu\/mihailo\/courses\/ee585\/f22\/mit-notes\/\/mit-notes.pdf"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"e_1_3_1_12_2","first-page":"1","volume-title":"Proceedings of the 2009 IEEE Conference on Emerging Technologies and Factory Automation (ETFA \u201909)","author":"Fiore Gabriella","year":"2009","unstructured":"Gabriella Fiore, Valeria Ercoli, Alf J. Isaksson, Krister Landern\u00e4s, and Maria Domenica Di Benedetto. 2009. Multihop multi-channel scheduling for wireless control in WirelessHART networks. In Proceedings of the 2009 IEEE Conference on Emerging Technologies and Factory Automation (ETFA \u201909). IEEE, Los Alamitos, CA, 1\u20138."},{"issue":"4","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1504\/IJAHUC.2014.066419","article-title":"Jamming and anti-jamming techniques in wireless networks: A survey","volume":"17","author":"Grover Kanika","year":"2014","unstructured":"Kanika Grover, Alvin Lim, and Qing Yang. 2014. Jamming and anti-jamming techniques in wireless networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing 17, 4 (2014), 197\u2013215.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/ASPDAC.2016.7428088","volume-title":"Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC \u201916)","author":"Jiang Ke","year":"2016","unstructured":"Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, and Lejla Batina. 2016. SPARTA: A scheduling policy for thwarting differential power analysis attacks. In Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC \u201916). IEEE, Los Alamitos, CA, 667\u2013672."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_330"},{"key":"e_1_3_1_16_2","first-page":"Article 22, 17","volume-title":"Proceedings of the 30th Euromicro Conference on Real-Time Systems (ECRTS \u201918)","volume":"106","author":"Kr\u00fcger Kristin","year":"2018","unstructured":"Kristin Kr\u00fcger, Marcus V\u00f6lp, and Gerhard Fohler. 2018. Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems. In Proceedings of the 30th Euromicro Conference on Real-Time Systems (ECRTS \u201918), Vol. 106. Article 22, 17 pages."},{"issue":"3","key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a cyberwarfare weapon","volume":"9","author":"Langner Ralph","year":"2011","unstructured":"Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9, 3 (2011), 49\u201351.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_1_18_2","volume-title":"Proceedings of the 2004 International Conference on Information Technology: Coding and Computing (ITCC \u201904)","volume":"2","author":"Lee R. B.","year":"2004","unstructured":"R. B. Lee, Z. J. Shi, Y. L. Yin, R. L. Rivest, and M. J. B. Robshaw. 2004. On permutation operations in cipher design. In Proceedings of the 2004 International Conference on Information Technology: Coding and Computing (ITCC \u201904), Vol. 2. 569\u2013577. DOI:10.1109\/ITCC.2004.1286714"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/958491.958506","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys \u201903).","author":"Levis Philip","year":"2003","unstructured":"Philip Levis, Nelson Lee, Matt Welsh, and David Culler. 2003. TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys \u201903). ACM, New York, NY, 126\u2013137. DOI:10.1145\/958491.958506"},{"issue":"2","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TAC.2008.2012009","article-title":"Stability and stabilizability of switched linear systems: A survey of recent results","volume":"54","author":"Lin Hai","year":"2009","unstructured":"Hai Lin and Panos J. Antsaklis. 2009. Stability and stabilizability of switched linear systems: A survey of recent results. IEEE Transactions on Automatic Control 54, 2 (2009), 308\u2013322.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"5","key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1109\/JPROC.2015.2497161","article-title":"Real-time wireless sensor-actuator networks for industrial cyber-physical systems","volume":"104","author":"Lu Chenyang","year":"2016","unstructured":"Chenyang Lu, Abusayeed Saifullah, Bo Li, Mo Sha, Humberto Gonzalez, Dolvara Gunatilaka, Chengjie Wu, Lanshun Nie, and Yixin Chen. 2016. Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proceedings of the IEEE 104, 5 (2016), 1013\u20131024.","journal-title":"Proceedings of the IEEE"},{"key":"e_1_3_1_22_2","first-page":"25","article-title":"Holistic cyber-physical management for dependable wireless control systems","volume":"3","author":"Ma Yehan","year":"2018","unstructured":"Yehan Ma, Dolvara Gunatilaka, Bo Li, Humberto Gonzalez, and Chenyang Lu. 2018. Holistic cyber-physical management for dependable wireless control systems. ACM Transactions on Cyber-Physical Systems 3, 1 (Sept. 2018), Article 3, 25 pages.","journal-title":"ACM Transactions on Cyber-Physical Systems"},{"key":"e_1_3_1_23_2","first-page":"89","volume-title":"Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII \u201918)","author":"Ma Y.","year":"2018","unstructured":"Y. Ma and C. Lu. 2018. Efficient holistic control over industrial wireless sensor-actuator networks. In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII \u201918). 89\u201398. DOI:10.1109\/ICII.2018.00018"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3371500"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/3302509.3311046","volume-title":"Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS \u201919).","author":"Mager Fabian","year":"2019","unstructured":"Fabian Mager, Dominik Baumann, Romain Jacob, Lothar Thiele, Sebastian Trimpe, and Marco Zimmerling. 2019. Feedback control goes wireless: Guaranteed stability over low-power multi-hop networks. In Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS \u201919). ACM, New York, NY, 97\u2013108. DOI:10.1145\/3302509.3311046"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","first-page":"418","DOI":"10.3182\/20120328-3-IT-3014.00071","article-title":"Stability analysis of PID controlled local model networks","volume":"45","author":"Mayr Christian H.","year":"2012","unstructured":"Christian H. Mayr, Christoph Hametner, Martin Kozek, and Stefan Jakubek. 2012. Stability analysis of PID controlled local model networks. IFAC Proceedings Volumes 45 (2012), 418\u2013423.","journal-title":"IFAC Proceedings Volumes"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.81"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/RTAS.2019.00017","volume-title":"Proceedings of the 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS \u201919)","author":"Nasri Mitra","year":"2019","unstructured":"Mitra Nasri, Thidapat Chantem, Gedare Bloom, and Ryan M. Gerdes. 2019. On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks. In Proceedings of the 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS \u201919). IEEE, Los Alamitos, CA, 103\u2013116."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"e_1_3_1_30_2","first-page":"175687","article-title":"Optimal harmonic period assignment with constrained number of distinct period values","author":"Pavi\u0107 I.","year":"2020","unstructured":"I. Pavi\u0107 and H. D\u017eapo. 2020. Optimal harmonic period assignment with constrained number of distinct period values. IEEE Access 8 (2020), 175687\u2013175712.","journal-title":"IEEE Access"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5346996"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-319-72296-2_12","volume-title":"Vibration Control of Active Structures","author":"Preumont Andr\u00e9","year":"2018","unstructured":"Andr\u00e9 Preumont. 2018. Controllability and observability. In Vibration Control of Active Structures. Springer, 289\u2013312."},{"key":"e_1_3_1_33_2","first-page":"1","volume-title":"Proceedings of the 2010 IEEE International Conference on Communications (ICC \u201910)","author":"Proano Alejandro","year":"2010","unstructured":"Alejandro Proano and Loukas Lazos. 2010. Selective jamming attacks in wireless networks. In Proceedings of the 2010 IEEE International Conference on Communications (ICC \u201910). IEEE, Los Alamitos, CA, 1\u20136."},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/3121050.3121062","volume-title":"Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval","author":"Raiber Fiana","year":"2017","unstructured":"Fiana Raiber and Oren Kurland. 2017. Kullback-Leibler divergence revisited. In Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval. ACM, New York, NY, 117\u2013124."},{"key":"e_1_3_1_35_2","first-page":"1","volume-title":"Proceedings of the 2009 IEEE Conference on Emerging Technologies and Factory Automation","author":"Raza Shahid","year":"2009","unstructured":"Shahid Raza, Adriaan Slabbert, Thiemo Voigt, and Krister Landern\u00e4s. 2009. Security considerations for the WirelessHART protocol. In Proceedings of the 2009 IEEE Conference on Emerging Technologies and Factory Automation. 1\u20138. DOI:10.1109\/ETFA.2009.5347043"},{"key":"e_1_3_1_36_2","first-page":"1","volume-title":"Proceedings of the 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN \u201913)","author":"Remke Anne","year":"2013","unstructured":"Anne Remke and Xian Wu. 2013. WirelessHART modeling and performance evaluation. In Proceedings of the 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN \u201913). IEEE, Los Alamitos, CA, 1\u201312."},{"key":"e_1_3_1_37_2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/RTSS.2015.23","volume-title":"Proceedings of the 2015 IEEE Real-Time Systems Symposium","author":"Saifullah Abusayeed","year":"2015","unstructured":"Abusayeed Saifullah, Dolvara Gunatilaka, Paras Tiwari, Mo Sha, Chenyang Lu, Bo Li, Chengjie Wu, and Yixin Chen. 2015. Schedulability analysis under graph routing in WirelessHART networks. In Proceedings of the 2015 IEEE Real-Time Systems Symposium. 165\u2013174. DOI:10.1109\/RTSS.2015.23"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2010.41"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600093"},{"key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/s11241-020-09354-z","article-title":"A schedule randomization policy to mitigate timing attacks in WirelessHART networks","volume":"56","author":"Samaddar Ankita","year":"2020","unstructured":"Ankita Samaddar, Arvind Easwaran, and Rui Tan. 2020. A schedule randomization policy to mitigate timing attacks in WirelessHART networks. Real-Time Systems 56 (2020), 452\u2013489.","journal-title":"Real-Time Systems"},{"issue":"4","key":"e_1_3_1_41_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/3378408.3378413","article-title":"SlotSwapper: A schedule randomization protocol for real-time WirelessHART networks","volume":"16","author":"Samaddar Ankita","year":"2020","unstructured":"Ankita Samaddar, Arvind Easwaran, and Rui Tan. 2020. SlotSwapper: A schedule randomization protocol for real-time WirelessHART networks. ACM SIGBED Review 16, 4 (2020), 32\u201337.","journal-title":"ACM SIGBED Review"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6314983"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834121"},{"key":"e_1_3_1_44_2","unstructured":"System Engineering Guidelines. 2016. System Engineering Guidelines IEC 62591 WirelessHART. Retrieved September 21 2023 from https:\/\/www.emerson.com\/documents\/automation\/engineering-guide-system-engineering-guidelines-iec-62591-wirelesshart-en-79900.pdf"},{"key":"e_1_3_1_45_2","unstructured":"Telosb Mote. 2004. Telosb Mote Datasheet. http:\/\/www2.ece.ohio-state.edu\/bibyk\/ee582\/telosMote.pdf"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2467391"},{"issue":"1","key":"e_1_3_1_47_2","first-page":"3","article-title":"DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks","volume":"15","author":"Tiloca Marco","year":"2018","unstructured":"Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, and Sajal K. Das. 2018. DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks. ACM Transactions on Sensor Networks 15, 1 (2018), 3.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_1_48_2","unstructured":"Wi-Spy. 2006. Wi-Spy USB Spectrum Analyzer. https:\/\/www.wi-fiplanet.com\/wi-spy-spectrum-analyzer"},{"key":"e_1_3_1_49_2","unstructured":"WirelessHART User Case Studies. 2019. WirelessHART User Case Studies. Retrieved September 21 2023 from https:\/\/www.fieldcommgroup.org\/sites\/default\/files\/imce_files\/technology\/documents\/WirelessHART%20User%20Case%20Studies%20-%20web%20publishing.pdf"},{"key":"e_1_3_1_50_2","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"Xu Wenyuan","year":"2005","unstructured":"Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, New York, NY."},{"key":"e_1_3_1_51_2","first-page":"1","volume-title":"Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS \u201916)","author":"Yoon Man-Ki","year":"2016","unstructured":"Man-Ki Yoon, Sibin Mohan, Chien-Ying Chen, and Lui Sha. 2016. TaskShuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS \u201916). IEEE, Los Alamitos, CA, 1\u201312."},{"key":"e_1_3_1_52_2","doi-asserted-by":"crossref","DOI":"10.1109\/QRS.2018.00025","article-title":"Cross-entropy: A new metric for software defect prediction","author":"Zhang Xian","year":"2018","unstructured":"Xian Zhang, K. Ben, and Jie Zeng. 2018. Cross-entropy: A new metric for software defect prediction. In Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability, and Security (QRS \u201918). 111\u2013122.","journal-title":"Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability, and Security (QRS \u201918)."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3624584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:46Z","timestamp":1750268986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":51,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3624584"],"URL":"https:\/\/doi.org\/10.1145\/3624584","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2023,11,9]]},"assertion":[{"value":"2022-03-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}