{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:19:01Z","timestamp":1773843541557,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323774","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T21:11:35Z","timestamp":1523481095000},"page":"405-410","source":"Crossref","is-referenced-by-count":22,"title":["Recent challenges, trends, and concerns related to IoT security: An evolutionary study"],"prefix":"10.23919","author":[{"given":"Chalee","family":"Vorakulpipat","sequence":"first","affiliation":[]},{"given":"Ekkachan","family":"Rattanalerdnusorn","sequence":"additional","affiliation":[]},{"given":"Phithak","family":"Thaenkaew","sequence":"additional","affiliation":[]},{"given":"Hoang","family":"Dang Hai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"bloomberg","year":"2014","journal-title":"7 Reasons Why the Internet of Things Is Doomed"},{"key":"ref11","author":"matthews","year":"2016","journal-title":"The &#x2018;unknown unknowns&#x2019; of IoT security"},{"key":"ref12","author":"sagy","year":"2017","journal-title":"Internet of things security new connections new threats"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2013.114"},{"key":"ref14","author":"eastwood","year":"2017","journal-title":"4 critical security challenges facing loT"},{"key":"ref15","author":"colombus","year":"2016","journal-title":"Internet Of Things On Pace To Replace Mobile Phones As Most Connected Device In 2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.02.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ref18","article-title":"Developing IoT security requirements for service providers","volume":"19","author":"kim","year":"2016","journal-title":"International Information Institute (Tokyo) Information"},{"key":"ref19","author":"nematollahi","year":"2016","journal-title":"Digital Watermarking"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-1-4419-1674-7_38","article-title":"An overview of privacy and security issues in the internet of things","author":"medaglia","year":"2010","journal-title":"The Internet of Things"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"ref6","article-title":"The basics of information security: understanding the fundamentals of InfoSec in theory and practice","author":"andress","year":"2014","journal-title":"Syngress"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069711"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2435000"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389028"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/CSAE.2011.5952899","article-title":"Internet of things: key technology, architecture and challenging problems","author":"zhang","year":"2011","journal-title":"Computer Science and Automation Engineering (CSAE) 2011 IEEE International Conference on"},{"key":"ref20","author":"barzilay","year":"2017","journal-title":"Can Blockchain and AI Accelerate the Arrival of the IoT Economy?"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","location":"Chuncheon-si Gangwon-do, Korea (South)","start":{"date-parts":[[2018,2,11]]},"end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323774.pdf?arnumber=8323774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T16:06:45Z","timestamp":1751558805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323774","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}