{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T04:05:04Z","timestamp":1754021104445},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:00:00Z","timestamp":1676764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:00:00Z","timestamp":1676764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,19]]},"DOI":"10.23919\/icact56868.2023.10079641","type":"proceedings-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T17:39:53Z","timestamp":1680111593000},"page":"394-400","source":"Crossref","is-referenced-by-count":1,"title":["Review of Internet of Things security protocols \u2013 A Bibliometric Analysis"],"prefix":"10.23919","author":[{"given":"Gardner","family":"Mwansa","sequence":"first","affiliation":[{"name":"Walter Sisulu University,Department of Information Technology,East London,South Africa"}]},{"given":"Ntima","family":"Mabanza","sequence":"additional","affiliation":[{"name":"Central University of Technology,Department of Information Technology,Bloemfontein,South Africa"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.4236\/jcc.2015.35021"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.4018\/978-1-4666-6539-2.ch074"},{"year":"2022","author":"Hattar","article-title":"IoT\u2019s Importance is Growing Rapidly, But Its Security Is Still Weak","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s11227-020-03213-1"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.13052\/jcsm2245-1439.414"},{"year":"2018","author":"Stallings","article-title":"COMPUTER SECURITY PRINCIPLES AND PRACTICE Fourth Edition","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3390\/jsan8020022"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.iot.2020.100264"},{"key":"ref9","article-title":"The IoT Attack Surface: Threats and Security Solutions","volume-title":"Trend Micro","author":"Micro","year":"2019"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3231053.3231103"},{"year":"2018","article-title":"Code of Practice for Consumer IoT Security","key":"ref11"},{"volume-title":"Bibliometrics and Citation Analysis\u202f: From the Science Citation Index to Cybermetrics","year":"2009","author":"de Bellis","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1038\/520429a"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/publications9010012"},{"year":"2017","author":"Krotov","article-title":"A Quick Introduction to R and RStudio\u00ae Tutorial","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.joi.2017.08.007"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/mcom.2018.1700332"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/tmc.2018.2866249"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/infcomw.2017.8116438"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/jiot.2019.2926365"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/comst.2020.2986444"}],"event":{"name":"2023 25th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2023,2,19]]},"location":"Pyeongchang, Korea, Republic of","end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 25th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10079232\/10079243\/10079641.pdf?arnumber=10079641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:15:34Z","timestamp":1707848134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10079641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,19]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/icact56868.2023.10079641","relation":{},"subject":[],"published":{"date-parts":[[2023,2,19]]}}}