{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:07:41Z","timestamp":1771002461421,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,9]]},"DOI":"10.1145\/3674213.3674216","type":"proceedings-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:12:42Z","timestamp":1770999162000},"page":"18-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Systematic Mapping and Temporal Reasoning of IoT Cyber Risks using Structured Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3256-9735","authenticated-orcid":false,"given":"Marta Zumaquero","family":"Gil","sequence":"first","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6120-3379","authenticated-orcid":false,"given":"Zhibo","family":"Hu","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8677-248X","authenticated-orcid":false,"given":"Minzhao","family":"Lyu","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3482-8442","authenticated-orcid":false,"given":"Gustavo","family":"Batista","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9333-7635","authenticated-orcid":false,"given":"Hassan","family":"Habibi Gharakheili","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,8,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2024. NTIA. https:\/\/ntia.gov\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475960.3475985"},{"key":"e_1_3_2_1_3_1","volume-title":"CVE Based Classification of Vulnerable IoT Systems. In International Conference on Dependability and Complex Systems","author":"Blinowski J","year":"2020","unstructured":"Grzegorz\u00a0J Blinowski and Pawe\u0142 Piotrowski. 2020. CVE Based Classification of Vulnerable IoT Systems. In International Conference on Dependability and Complex Systems. Brun\u00f3w, Poland."},{"key":"e_1_3_2_1_4_1","unstructured":"[4] CVE-Details. 2024. https:\/\/www.cvedetails.com\/"},{"key":"e_1_3_2_1_5_1","unstructured":"[5] CXSecurity. 2024. https:\/\/cxsecurity.com\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. USENIX Security","author":"Dong Y.","year":"2019","unstructured":"Y. Dong 2019. Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. In Proc. USENIX Security. Santa Clara, CA, USA."},{"key":"e_1_3_2_1_7_1","unstructured":"[7] Exploit-DB. 2024. https:\/\/www.exploit-db.com\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977172.74"},{"key":"e_1_3_2_1_9_1","unstructured":"Center for Strategic & International\u00a0Studies. 2024. Significant Cyber Incidents. https:\/\/bit.ly\/42EBjhI"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452745"},{"key":"e_1_3_2_1_11_1","unstructured":"Gartner Insights. 2024. Cyber Asset Attack Surface Management (CAASM) Reviews and Ratings. https:\/\/www.gartner.com\/reviews\/market\/cyber-asset-attack-surface-management"},{"key":"e_1_3_2_1_12_1","volume-title":"Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM TSEM (Apr","author":"H. Guo","year":"2022","unstructured":"H. Guo 2022. Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM TSEM (Apr 2022)."},{"key":"e_1_3_2_1_13_1","volume-title":"Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure","author":"Ayyoob Hamza","year":"2022","unstructured":"Ayyoob Hamza 2022. Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure. IEEE Internet of Things Journal (Jul 2022)."},{"key":"e_1_3_2_1_14_1","unstructured":"[14] ICS-Advisory. 2024. http:\/\/tinyurl.com\/uwd9sphs"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70881-8_4"},{"key":"e_1_3_2_1_16_1","volume-title":"IoT Security: An End-to-End View and Case Study. arXiv preprint arXiv:1805.05853","author":"Zhen Ling","year":"2018","unstructured":"Zhen Ling 2018. IoT Security: An End-to-End View and Case Study. arXiv preprint arXiv:1805.05853 (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3221981"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109387"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647584"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. IEEE SysCon","author":"A.","unstructured":"Adeel\u00a0A. Malik and Deepak\u00a0K. Tosh. 2023. Dynamic Vulnerability Classification for Enhanced Cyber Situational Awareness. In Proc. IEEE SysCon. Vancouver, Canada."},{"key":"e_1_3_2_1_22_1","unstructured":"martazg01. 2024. vesData. https:\/\/github.com\/martazg01\/vesData."},{"key":"e_1_3_2_1_23_1","unstructured":"NetScout. 2023. Visibility Is Key to Preventing Outbound and Cross-bound DDoS Attacks. https:\/\/bit.ly\/3HW2NFO"},{"key":"e_1_3_2_1_24_1","unstructured":"[24] NVD. 2024. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_25_1","unstructured":"[25] OpenCVE. 2024. https:\/\/www.opencve.io\/welcome"},{"key":"e_1_3_2_1_26_1","volume-title":"Risk Prediction of IoT Devices Based on Vulnerability Analysis. ACM Transactions on Privacy and Security","author":"Pascal Oser","year":"2022","unstructured":"Pascal Oser 2022. Risk Prediction of IoT Devices Based on Vulnerability Analysis. ACM Transactions on Privacy and Security (2022)."},{"key":"e_1_3_2_1_27_1","unstructured":"[27] Packet Storm Security. 2024. http:\/\/tinyurl.com\/na5sus3d"},{"key":"e_1_3_2_1_28_1","unstructured":"[28] PatchDB. 2024. https:\/\/sunlab-gmu.github.io\/PatchDB\/"},{"key":"e_1_3_2_1_29_1","unstructured":"[29] Patchwork. 2024. https:\/\/patchwork.ozlabs.org\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Jeffrey Pennington 2014. GloVe: Global Vectors for Word Representation. In Empirical Methods in Natural Language Processing.","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. EAI MobiQuitous. Virtual Event.","author":"A","year":"2021","unstructured":"Carlos\u00a0A Rivera\u00a0A 2021. Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines. In Proc. EAI MobiQuitous. Virtual Event."},{"key":"e_1_3_2_1_32_1","unstructured":"[32] securityfocus. 2024. http:\/\/tinyurl.com\/2w4xsw23"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"e_1_3_2_1_34_1","unstructured":"[34] Snyk -Vulnerability. 2024. https:\/\/security.snyk.io\/"},{"key":"e_1_3_2_1_35_1","unstructured":"The MITRE Cooperation. 2024. CVE. https:\/\/cve.mitre.org\/"},{"key":"e_1_3_2_1_36_1","unstructured":"[36] VulDB. 2024. https:\/\/vuldb.com\/"},{"key":"e_1_3_2_1_37_1","unstructured":"[37] Vulnerability & Exploit. 2024. http:\/\/tinyurl.com\/2r3dezxs"},{"key":"e_1_3_2_1_38_1","unstructured":"[38] Vulnerability-Lab. 2024. http:\/\/tinyurl.com\/3ec57br8"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00030"},{"key":"e_1_3_2_1_40_1","unstructured":"Kinza Yasar. 2023. Cyber Insurance. https:\/\/bit.ly\/3wdvL1k"}],"event":{"name":"AINTEC '24: Asian Internet Engineering Conference 2024","location":"Sydney NSW Australia","acronym":"AINTEC '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 19th Asian Internet Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674213.3674216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:12:55Z","timestamp":1770999175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674213.3674216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,9]]},"references-count":40,"alternative-id":["10.1145\/3674213.3674216","10.1145\/3674213"],"URL":"https:\/\/doi.org\/10.1145\/3674213.3674216","relation":{},"subject":[],"published":{"date-parts":[[2024,8,9]]},"assertion":[{"value":"2024-08-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}