{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:15:19Z","timestamp":1730344519059,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.23919\/mipro48935.2020.9245229","type":"proceedings-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T21:51:34Z","timestamp":1604699494000},"page":"1064-1069","source":"Crossref","is-referenced-by-count":3,"title":["Towards the Open Ontology for IoT Ecosystem\u2019s Security"],"prefix":"10.23919","author":[{"given":"Igor","family":"Tomicic","sequence":"first","affiliation":[]},{"given":"Petra","family":"Grd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.28"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.329"},{"key":"ref33","first-page":"335","volume":"2870","author":"denker","year":"2003","journal-title":"Security for daml web services Annotation and matchmaking"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.12.023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533084"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2008.4530312"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11575801_34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2004.11.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25956-5_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-210-7.ch018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"That &#x2018;Internet of Things&#x2019; thing","year":"0","key":"ref1"},{"key":"ref20","article-title":"A study of existing ontologies in the iot-domain","volume":"abs 1707 112","author":"garvita bajaj","year":"2017","journal-title":"CoRR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7793744"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32686-8_1"},{"journal-title":"An ontology for the automated deployment of applications in heterogeneous iot environments 1","year":"2012","author":"kotis","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2093190.2093193"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/102675.102676"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_13"},{"journal-title":"Methontology From Ontological Art Towards Ontological Engineering","year":"1997","author":"fern\u00e1ndez-l\u00f3pez","key":"ref50"},{"key":"ref51","article-title":"Ontology development 101: A guide to creating your","author":"noy","year":"2001","journal-title":"rst ontology Technical Report KSL-01-05 Stanford Medical Informatics Stanford Tech Rep"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973621"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0384-6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.52"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2010.104"},{"journal-title":"A taxonomy of security-related requirements","year":"2020","author":"firesmith","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/13504509.2016.1153527"},{"key":"ref13","first-page":"1307","article-title":"A case study on renewable energy management in an eco-village community in croatia&#x2013;an agent based approach","volume":"6","author":"tomi?i?","year":"2016","journal-title":"Int Journal of Renewable Energy"},{"journal-title":"Agent-based framework for modelling and simulation of resource management in smart self-sustainable human settlements","year":"2016","author":"tomi?i?","key":"ref14"},{"journal-title":"Iot connected devices installed base worldwide from 2015 to 2025","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2015.7322984"},{"key":"ref17","article-title":"Security, privacy and trust in internet of things: The road ahead","volume":"76","author":"sicari","year":"2014","journal-title":"Computer Networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766400"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888907001208"},{"journal-title":"Iterative Model-Based Identification of Building Components and Appliances by Means of Sensor-Actuator Networks","year":"2011","author":"hu","key":"ref4"},{"journal-title":"Towards a Definition of the Internet of Things (IoT)","year":"2015","author":"roberto minerva","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525602"},{"key":"ref5","first-page":"1115","article-title":"A review of soft biometrics for iot","author":"tomi?i?","year":"2018","journal-title":"International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093829"},{"key":"ref7","first-page":"69","article-title":"Research on the architecture and key technology of internet of things (iot) applied on smart grid","author":"yun","year":"2010","journal-title":"Advances in Energy Engineering (ICAEE) 2010 International Conference on"},{"key":"ref49","first-page":"2004","article-title":"Owl web ontology language overview","volume":"10","author":"mcguinness","year":"2004","journal-title":"W3C Recommendation"},{"key":"ref9","first-page":"9","article-title":"Internet of things strategic research roadmap","volume":"1","author":"vermesan","year":"2011","journal-title":"Internet of Things-Global Technological and Societal Trends"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.33"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56535-4_17"},{"key":"ref48","article-title":"Modeling vulnerable internet of things on shodan and censys: An ontology for cyber security","author":"arnaert","year":"2016","journal-title":"SECURWARE 2016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s18093053"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22056-2_64"},{"key":"ref41","first-page":"1387","article-title":"An ontology for modelling security: The tropos approach, knowledge-based intelligent information and engineering systems","author":"mouratidis","year":"2003","journal-title":"Lecture Notes in Artificial Intelligence"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/iThings.2014.25"}],"event":{"name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2020,9,28]]},"location":"Opatija, Croatia","end":{"date-parts":[[2020,10,2]]}},"container-title":["2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9245088\/9245075\/09245229.pdf?arnumber=9245229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T05:10:18Z","timestamp":1610514618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9245229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":54,"URL":"https:\/\/doi.org\/10.23919\/mipro48935.2020.9245229","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}