{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:10:10Z","timestamp":1761999010782,"version":"build-2065373602"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973624","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"1302-1308","source":"Crossref","is-referenced-by-count":13,"title":["Trends in IoT security"],"prefix":"10.23919","author":[{"given":"M.","family":"Radovan","sequence":"first","affiliation":[]},{"given":"B.","family":"Golub","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Nordic semiconductor","article-title":"Bluetooth low energy wireless technology backgrounder","year":"2011","key":"ref10"},{"journal-title":"IETF Technical Documentation for 6LowPAN","year":"0","key":"ref11"},{"journal-title":"Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security","year":"2010","key":"ref12"},{"journal-title":"Power and Energy Automation Conference Spokane","article-title":"White Paper WP152016EN, The Internet of Things and the energy sector: myth or opportunity","year":"2016","key":"ref13"},{"journal-title":"Towards a Model for Security and Privacy in the Internet of Things","year":"0","author":"radomirovi?","key":"ref14"},{"key":"ref4","article-title":"The Internet of Things - Promise for the future","author":"coetzee","year":"0","journal-title":"IST-Africa 2011 Conference Proceedings"},{"key":"ref3","article-title":"The Internet of Things: A Critique of Ambient Technology and the All-Seeing Network of RFID","author":"van kranenburg","year":"2007","journal-title":"The Netherlands Institute of Network Cultures"},{"journal-title":"Pictures Source","article-title":"Sizing Up the Internet of Things","year":"2015","key":"ref6"},{"journal-title":"The Internet of Things","year":"2011","author":"evans","key":"ref5"},{"key":"ref8","article-title":"A Survey on Internet of Things: Security and Privacy Issues","volume":"90","author":"kumar","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref7","first-page":"1282","article-title":"RFID Technology and its application in IoT","author":"jia","year":"2012","journal-title":"2nd IEEE Int Conf Consum Electron CECNet"},{"key":"ref2","article-title":"The Internet of Things Explained","author":"hughes","year":"2014","journal-title":"Pictures Source"},{"key":"ref1","article-title":"Internet of Things","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"journal-title":"ISO\/IEC 18092 2004 Information Technology","article-title":"Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol NFCIP-1","year":"2011","key":"ref9"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973624.pdf?arnumber=7973624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:57:37Z","timestamp":1502884657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973624","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}