{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:21:18Z","timestamp":1740108078075,"version":"3.37.3"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:00:00Z","timestamp":1582588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:00:00Z","timestamp":1582588800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s00521-020-04772-3","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T12:03:04Z","timestamp":1582632184000},"page":"16119-16133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things"],"prefix":"10.1007","volume":"32","author":[{"given":"Hamed","family":"HaddadPajouh","sequence":"first","affiliation":[]},{"given":"Raouf","family":"Khayami","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0049-4296","authenticated-orcid":false,"given":"Reza M.","family":"Parizi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,25]]},"reference":[{"key":"4772_CR1","doi-asserted-by":"crossref","unstructured":"Zhu Q, Wang R, Chen Q, Liu Y, Qin W (2010) Iot gateway: bridgingwireless sensor networks into Internet of Things. In: 2010 IEEE\/IFIP international conference on embedded and ubiquitous computing. IEEE, pp 347\u2013352","DOI":"10.1109\/EUC.2010.58"},{"issue":"6","key":"4772_CR2","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"key":"4772_CR3","volume-title":"Internet of Things security and forensics: challenges and opportunities","author":"M Conti","year":"2018","unstructured":"Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of Things security and forensics: challenges and opportunities. Elsevier, Amsterdam"},{"key":"4772_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100111","author":"J Sakhnini","year":"2019","unstructured":"Sakhnini J, Karimipour H, Dehghantanha A, Parizi RM, Srivastava G (2019) Security aspects of Internet of Things aided smart grids: a bibliometric survey. Internet Things. https:\/\/doi.org\/10.1016\/j.iot.2019.100111","journal-title":"Internet Things"},{"key":"4772_CR5","doi-asserted-by":"publisher","unstructured":"Darabian H, Dehghantanha A, Hashemi S, Taheri M, Azmoodeh A, Homayoun S, Choo K-KR, Parizi RM (2020) A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web. https:\/\/doi.org\/10.1007\/s11280-019-00755-0","DOI":"10.1007\/s11280-019-00755-0"},{"issue":"2","key":"4772_CR6","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.jnca.2011.10.015","volume":"35","author":"MC Domingo","year":"2012","unstructured":"Domingo MC (2012) An overview of the Internet of Things for people with disabilities. J Netw Comput Appl 35(2):584\u2013596","journal-title":"J Netw Comput Appl"},{"key":"4772_CR7","doi-asserted-by":"crossref","unstructured":"Jia X, Feng Q, Fan T, Lei Q (2012) RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1282\u20131285","DOI":"10.1109\/CECNet.2012.6201508"},{"issue":"1","key":"4772_CR8","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TII.2013.2250510","volume":"10","author":"L Wang","year":"2013","unstructured":"Wang L, Da Xu L, Bi Z, Xu Y (2013) Data cleaning for RFID and WSN integration. IEEE Trans Ind Inf 10(1):408\u2013418","journal-title":"IEEE Trans Ind Inf"},{"key":"4772_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.adhoc.2013.02.008","volume":"18","author":"CH Liu","year":"2014","unstructured":"Liu CH, Yang B, Liu T (2014) Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw 18:85\u2013101","journal-title":"Ad Hoc Netw"},{"key":"4772_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100129","author":"H HaddadPajouh","year":"2019","unstructured":"HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2019) A survey on Internet of Things security: requirements, challenges, and solutions. Internet Things. https:\/\/doi.org\/10.1016\/j.iot.2019.100129","journal-title":"Internet Things"},{"key":"4772_CR11","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1016\/j.procs.2015.05.122","volume":"52","author":"A Gaur","year":"2015","unstructured":"Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089\u20131094","journal-title":"Procedia Comput Sci"},{"key":"4772_CR12","doi-asserted-by":"crossref","unstructured":"Binti N, Kamaludeen A, Lee SP, Parizi RM (2019) Guideline-based approach for IoT home application development. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 929\u2013936","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00165"},{"key":"4772_CR13","unstructured":"Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International conference on advances in energy engineering. IEEE, pp 69\u201372"},{"key":"4772_CR14","doi-asserted-by":"crossref","first-page":"5132","DOI":"10.1109\/JIOT.2019.2897119","volume":"6","author":"TM Behera","year":"2019","unstructured":"Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in wsns for IoT application. IEEE Internet Things J 6:5132\u20135139","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"4772_CR15","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","volume":"2","author":"L Catarinucci","year":"2015","unstructured":"Catarinucci L, De Donno D, Mainetti L, Palano L, Patrono L, Stefanizzi ML, Tarricone L (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515\u2013526","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"4772_CR16","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1109\/TII.2014.2299233","volume":"10","author":"W He","year":"2014","unstructured":"He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Trans Ind Inf 10(2):1587\u20131595","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"4772_CR17","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/JIOT.2019.2940988","volume":"7","author":"TM Behera","year":"2020","unstructured":"Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2020) I-sep: an improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J 7(1):710\u2013717","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"4772_CR18","doi-asserted-by":"crossref","first-page":"e3595","DOI":"10.1002\/ett.3595","volume":"30","author":"A Paranjothi","year":"2019","unstructured":"Paranjothi A, Tanik U, Wang Y, Khan MS (2019) Hybrid-vehfog: a robust approach for reliable dissemination of critical messages in connected vehicles. Trans Emerg Telecommun Technol 30(6):e3595 (e3595 ETT-18-0175.R3)","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"4772_CR19","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11277-016-3842-3","volume":"92","author":"G Garda\u0161evi\u0107","year":"2017","unstructured":"Garda\u0161evi\u0107 G, Veleti\u0107 M, Maleti\u0107 N, Vasiljevi\u0107 D, Radusinovi\u0107 I, Tomovi\u0107 S, Radonji\u0107 M (2017) The IoT architectural framework, design issues and application domains. Wirel Pers Commun 92(1):127\u2013148","journal-title":"Wirel Pers Commun"},{"key":"4772_CR20","first-page":"40","volume":"7","author":"SS Karanki","year":"2017","unstructured":"Karanki SS, Khan MS (2017) SMMV: secure multimedia delivery in vehicles using roadside infrastructure. Veh Commun 7:40\u201350","journal-title":"Veh Commun"},{"issue":"1","key":"4772_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2016.2615180","volume":"4","author":"AH Ngu","year":"2016","unstructured":"Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2016) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1\u201320","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"4772_CR22","doi-asserted-by":"crossref","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","volume":"13","author":"SDT Kelly","year":"2013","unstructured":"Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846\u20133853","journal-title":"IEEE Sens J"},{"issue":"3","key":"4772_CR23","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/JIOT.2016.2624824","volume":"4","author":"R Giuliano","year":"2016","unstructured":"Giuliano R, Mazzenga F, Neri A, Vegni AM (2016) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645\u2013657","journal-title":"IEEE Internet Things J"},{"key":"4772_CR24","unstructured":"Zhang Y, Raychadhuri D, Ravindran R, Wang G (2013) ICN based architecture for IoT. IRTF Contribution"},{"issue":"6","key":"4772_CR25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2014.7000963","volume":"21","author":"K-H Chang","year":"2014","unstructured":"Chang K-H (2014) Bluetooth: a viable solution for IoT?[Industry perspectives]. IEEE Wirel Commun 21(6):6\u20137","journal-title":"IEEE Wirel Commun"},{"key":"4772_CR26","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.jnca.2016.03.014","volume":"71","author":"J Santos","year":"2016","unstructured":"Santos J, Rodrigues JJ, Silva BM, Casal J, Saleem K, Denisov V (2016) An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. J Netw Comput Appl 71:194\u2013204","journal-title":"J Netw Comput Appl"},{"key":"4772_CR27","doi-asserted-by":"crossref","unstructured":"Behera TM, Khan MS, Mohapatra SK, Samail UC, Bhuiyan MZA (2019) Energy-efficient routing for greenhouse monitoring using heterogeneous sensor networks. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 953\u2013958","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00168"},{"issue":"5","key":"4772_CR28","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2017.1700030","volume":"31","author":"J Ren","year":"2017","unstructured":"Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96\u2013105","journal-title":"IEEE Netw"},{"key":"4772_CR29","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88\u201396","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"4772_CR30","doi-asserted-by":"crossref","first-page":"4428","DOI":"10.1109\/JIOT.2018.2815038","volume":"5","author":"E Baccelli","year":"2018","unstructured":"Baccelli E, G\u00fcndo\u011fan C, Hahm O, Kietzmann P, Lenders MS, Petersen H, Schleiser K, Schmidt TC, W\u00e4hlisch M (2018) RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J 5(6):4428\u20134440","journal-title":"IEEE Internet Things J"},{"key":"4772_CR31","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-27139-2_7","volume-title":"Ambient intelligence","author":"P Levis","year":"2005","unstructured":"Levis P et al (2005) TinyOS: an operating system for sensor networks. In: Weber W, Rabaey JM, Aarts E (eds) Ambient intelligence. Springer, Berlin, Heidelberg, pp 115\u2013148"},{"key":"4772_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sysarc.2019.01.017","volume":"97","author":"EM Dovom","year":"2019","unstructured":"Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1\u20137","journal-title":"J Syst Architect"},{"key":"4772_CR33","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10\u201328","journal-title":"J Netw Comput Appl"},{"issue":"8","key":"4772_CR34","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20(8):2481\u20132501","journal-title":"Wireless Netw"},{"key":"4772_CR35","unstructured":"Kupreev O, Kupreev O, Badovskaya E, Gutnikov A. DDoS attacks in Q4 2018, Securelist english. [Online]. https:\/\/securelist.com\/ddos-attacks-in-q4-2018\/89565\/. Accessed 21 Dec 2019"},{"issue":"5","key":"4772_CR36","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MIS.2017.3711653","volume":"32","author":"P Patel","year":"2017","unstructured":"Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32(5):64\u201369","journal-title":"IEEE Intell Syst"},{"issue":"1","key":"4772_CR37","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96\u2013101","journal-title":"IEEE Netw"},{"key":"4772_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2966970","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo KR (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2020.2966970","journal-title":"IEEE Trans Serv Comput"},{"key":"4772_CR39","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","volume":"52","author":"SR Moosavi","year":"2015","unstructured":"Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452\u2013459","journal-title":"Procedia Comput Sci"},{"key":"4772_CR40","doi-asserted-by":"crossref","unstructured":"Leusse PD, Dimitrakos T (2010) SOA-Based security governance middleware. In: 2010 fourth international conference on emerging security information, systems and technologies","DOI":"10.1109\/SECURWARE.2010.17"},{"key":"4772_CR41","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.adhoc.2014.12.005","volume":"32","author":"M Vu\u010dini\u0107","year":"2015","unstructured":"Vu\u010dini\u0107 M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw 32:3\u201316","journal-title":"Ad Hoc Netw"},{"key":"4772_CR42","doi-asserted-by":"crossref","unstructured":"Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International conference on electronic design (ICED). IEEE, pp 321\u2013326","DOI":"10.1109\/ICED.2016.7804660"},{"issue":"1","key":"4772_CR43","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2017.17","volume":"21","author":"S Pinto","year":"2017","unstructured":"Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40\u201347","journal-title":"IEEE Internet Comput"},{"key":"4772_CR44","doi-asserted-by":"crossref","unstructured":"Jang J, Kong S, Kim M, Kim D, Kang BB (2015) SeCReT: secure channel between rich execution environment and trusted execution environment. In: Proceedings 2015 network and distributed system security symposium","DOI":"10.14722\/ndss.2015.23189"},{"key":"4772_CR45","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.future.2014.08.005","volume":"49","author":"W Dai","year":"2015","unstructured":"Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2015) TEE: a virtual DRTM based execution environment for secure cloud-end computing. Future Gener Comput Syst 49:47\u201357","journal-title":"Future Gener Comput Syst"},{"key":"4772_CR46","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MIC.2012.29","volume":"2","author":"C Bormann","year":"2012","unstructured":"Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 2:62\u201367","journal-title":"IEEE Internet Comput"},{"key":"4772_CR47","doi-asserted-by":"crossref","unstructured":"Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S A publish\/subscribe protocol for wireless sensor networks. In: 2008 3rd International conference on communication systems software and middleware and workshops (COMSWARE\u201908). IEEE, pp 791\u2013798","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"4772_CR48","doi-asserted-by":"crossref","unstructured":"Ito M, Iyatomi H (2018) Web application firewall using character-level convolutional neural network. In: 2018 IEEE 14th International colloquium on signal processing and its applications (CSPA). IEEE, pp 103\u2013106","DOI":"10.1109\/CSPA.2018.8368694"},{"key":"4772_CR49","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1016\/j.procs.2014.07.064","volume":"34","author":"C Bekara","year":"2014","unstructured":"Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532\u2013537","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"4772_CR50","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10844-015-0388-x","volume":"48","author":"HH Pajouh","year":"2017","unstructured":"Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61\u201374","journal-title":"J Intell Inf Syst"},{"issue":"2","key":"4772_CR51","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2016","unstructured":"Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 7(2):314\u2013323","journal-title":"IEEE Trans Emerg Top Comput."},{"key":"4772_CR52","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141\u20131152","journal-title":"J Ambient Intell Hum Comput"},{"key":"4772_CR53","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023"},{"key":"4772_CR54","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17), pp 1093\u20131110"},{"issue":"7","key":"4772_CR55","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"issue":"3","key":"4772_CR56","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","volume":"24","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10\u201316","journal-title":"IEEE Wirel Commun"},{"key":"4772_CR57","volume-title":"Handbook of big data and iot security","author":"R HosseiniNejad","year":"2019","unstructured":"HosseiniNejad R, HaddadPajouh H, Dehghantanha A, Parizi RM (2019) A cyber kill chain based analysis of remote access trojans. In: Dehghantanha A, Choo KK (eds) Handbook of big data and iot security. Springer, Cham"},{"key":"4772_CR58","doi-asserted-by":"crossref","unstructured":"Taylor PJ, Dargahi T, Dehghantanha A (2019) Analysis of APT actors targeting iot and big data systems: shell_crew, nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study. In: Handbook of big data and iot security, pp 257\u2013272","DOI":"10.1007\/978-3-030-10543-3_11"},{"key":"4772_CR59","series-title":"Advanced sciences and technologies for security applications","volume-title":"Critical infrastructure security and resilience","author":"H Mwiki","year":"2019","unstructured":"Mwiki H, Dargahi T, Dehghantanha A, Choo KKR (2019) Analysis and triage of advanced hacking groups targeting western countries criticalnational infrastructure: APT28, RED October, and Regin. In: Gritzalis D, Theocharidou M, Stergiopoulos G (eds) Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Springer, Cham"},{"issue":"4","key":"4772_CR60","first-page":"865","volume":"15","author":"PN Bahrami","year":"2019","unstructured":"Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo KK, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics. techniques, and procedures. J Inf Process Syst 15(4):865\u2013889","journal-title":"J Inf Process Syst"},{"key":"4772_CR61","unstructured":"Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design"},{"key":"4772_CR62","doi-asserted-by":"crossref","unstructured":"Bhuyan P, Ray A, Mohapatra DP (2015) A service-oriented architecture (SOA) framework component for verification of choreography. In: Jain L, Behera H, Mandal J, Mohapatra D (eds) Computational intelligence in data mining. Smart Innovation, Systems and Technologies, vol 3. Springer, New Delhi","DOI":"10.1007\/978-81-322-2202-6_3"},{"key":"4772_CR63","doi-asserted-by":"crossref","unstructured":"Guan L, Liu P, Xing X, Ge X, Zhang S, Yu M, Jaeger T (2017) Trustshadow: secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. ACM, pp 488\u2013501","DOI":"10.1145\/3081333.3081349"},{"issue":"2","key":"4772_CR64","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MCOM.2018.1701047","volume":"57","author":"RT Tiburski","year":"2019","unstructured":"Tiburski RT, Moratelli CR, Johann SF, Neves MV, de Matos E, Amaral LA, Hessel F (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67\u201373","journal-title":"IEEE Commun Mag"},{"key":"4772_CR65","doi-asserted-by":"crossref","first-page":"155472","DOI":"10.1109\/ACCESS.2019.2948027","volume":"7","author":"AIA Ahmed","year":"2019","unstructured":"Ahmed AIA, Gani A, Hamid SHA, Abdelmaboud A, Syed HJ, Habeeb Mohamed RAA, Ali I (2019) Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access 7:155472\u2013155488","journal-title":"IEEE Access"},{"key":"4772_CR66","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1016\/j.future.2017.04.004","volume":"78","author":"MW Woo","year":"2018","unstructured":"Woo MW, Lee J, Park K (2018) A reliable IoT system for personal healthcare devices. Future Gener Comput Syst 78:626\u2013640","journal-title":"Future Gener Comput Syst"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04772-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-020-04772-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04772-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T15:47:58Z","timestamp":1695829678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-020-04772-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,25]]},"references-count":66,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["4772"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-04772-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2020,2,25]]},"assertion":[{"value":"16 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}