{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:39:19Z","timestamp":1740101959868,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.23919\/ifipnetworking57963.2023.10186388","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:38:31Z","timestamp":1690220311000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Overcoming New Technologies Challenges in IoT Security Labs: Strategies for Effective Adaptation"],"prefix":"10.23919","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4311-3449","authenticated-orcid":false,"given":"Dimitrios","family":"Simopoulos","sequence":"first","affiliation":[{"name":"Democritus University of Thrace,Medical Informatics Laboratory,Department of Medicine,Alexandroupolis,Greece"}]},{"given":"Andreas","family":"Wolf","sequence":"additional","affiliation":[{"name":"Akkodis Germany,IT Digital Solutions,Sindelfingen,Germany"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMST.2019.2914094"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s13222-021-00386-8"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-319-67383-7_2"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1002\/9781118988374"},{"year":"2021","journal-title":"OpenAI Introducing ChatGPT","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MACS48846.2019.9024768"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/3-540-48405-1_25"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/s19081793"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1002\/spe.4380250706"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref21","first-page":"493","article-title":"Iot: The internet of threats and static program analysis defense","author":"huuck","year":"0","journal-title":"EmbeddedWorld 2015 Exibition & Conferences"},{"key":"ref2","article-title":"The PASTA threat model implementation in the IoT development life cycle","author":"wolf","year":"0","journal-title":"Information 2020"},{"year":"2013","journal-title":"ARM Architecture Reference Manual","key":"ref1"},{"year":"2021","journal-title":"OpenAI codex","key":"ref17"},{"key":"ref16","article-title":"Etal OpwnAI: AI that can save the day or hack it away","author":"ben-moshe","year":"2023","journal-title":"Check Point Research"},{"key":"ref19","first-page":"346","article-title":"Exploiting DLMS\/COSEM Data Compression To Learn Power Consumption Patterns","author":"feh\u00e9r","year":"0","journal-title":"2021 IEEE International Conference on Communications Control and Computing Technologies for Smart Grids (SmartGridComm)"},{"year":"2023","journal-title":"Check point software Clusterxl","article-title":"Cybercriminals Bypass CHATGPT restrictions to generate malicious content","key":"ref18"},{"year":"2007","author":"van kranenburg","journal-title":"The Internet of Things A Critique of Ambient Technology and the All-seeing Network of RFID","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/I2MTC.2016.7520408"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3390\/s17020372"},{"key":"ref4","first-page":"1","article-title":"IoT security testing with SecLab","author":"schwaiger","year":"0","journal-title":"IEEE\/IFIP Network Operations and Management Symposium-NOMS"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/WF-IoT.2015.7389098"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/fi14110335"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.23919\/MIPRO.2018.8400211"}],"event":{"name":"2023 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2023,6,12]]},"location":"Barcelona, Spain","end":{"date-parts":[[2023,6,15]]}},"container-title":["2023 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10186376\/10186354\/10186388.pdf?arnumber=10186388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T21:48:42Z","timestamp":1690235322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10186388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking57963.2023.10186388","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]}}}