{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:45:05Z","timestamp":1725500705631},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/meco.2018.8406030","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:17:35Z","timestamp":1531178255000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Cybersecurity of fiscal devices with GPRS terminals"],"prefix":"10.1109","author":[{"given":"Milan","family":"Prokin","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Neskovic","sequence":"additional","affiliation":[]},{"given":"Natasa","family":"Neskovic","sequence":"additional","affiliation":[]},{"given":"Dragana","family":"Prokin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"An American strategy for cyberspace_Advancing freedom, security, and prosperity","author":"eisenach","year":"2016","journal-title":"The Journal of the American Enterprise Institute"},{"journal-title":"McAfee Labs Intel Security","article-title":"Threats report","year":"2015","key":"ref11"},{"journal-title":"Armies of hacked IoT devices launch unprecedented DDoS attacks","year":"2016","author":"constantin","key":"ref12"},{"journal-title":"Here are the 61 passwords that powered the Mirao IoT botnet","year":"2016","author":"ragan","key":"ref13"},{"journal-title":"Code in the wild to infect millions of IoT devices for crippling DDoS attacks","year":"2016","author":"storm","key":"ref14"},{"journal-title":"To predict the IoT future it helps to look to the past","year":"2016","author":"dresselhuys","key":"ref15"},{"journal-title":"How the ‘insecurity of things’ creates the next wave of security opportunities","year":"2016","author":"ramsinghani","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"journal-title":"This Security Camera Was Infected by Malware 98 Seconds after It Was Plugged in","year":"2016","author":"coldewey","key":"ref18"},{"journal-title":"Mozilla The internet is unhealthy and urgently needs your help","year":"2016","author":"tung","key":"ref19"},{"key":"ref4","first-page":"34","article-title":"Wireless data transfer from taxpayers to the tax administration","author":"ilic","year":"2006","journal-title":"Tax Tribune Intra-European Organisation of Tax Administrations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0005844800540061"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2011.6143687"},{"journal-title":"Siemens AG Corporate Communications","article-title":"Verifying sales tax revenues with Siemens wireless modules: Contract in Serbia and Montenegro","year":"2006","key":"ref5"},{"journal-title":"CERT UK","article-title":"Common cyber attacks","year":"2015","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2016.7525759"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5220\/0005558901740179"},{"key":"ref1","article-title":"Electronic fiscal devices (EFDs)_An empirical study of their impact on taxpayer compliance and administrative efficiency","author":"casey","year":"2015","journal-title":"International Monetary Fund"},{"journal-title":"The Department of commerce Internet policy task force & Digital economy leadership team","article-title":"Fostering the advancement of the Internet of Things","year":"2017","key":"ref9"},{"journal-title":"Hacking your phone","year":"2016","author":"alfonsi","key":"ref20"},{"journal-title":"Qualification form for fiscal device manufacturer registration","year":"2004","author":"prokin","key":"ref22"},{"journal-title":"BI Intelligence","article-title":"This one chart explains why cybersecurity is so important","year":"2016","key":"ref21"},{"journal-title":"Qualification form for GPRS terminal manufacturer registration","year":"2005","author":"prokin","key":"ref23"}],"event":{"name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2018,6,10]]},"location":"Budva","end":{"date-parts":[[2018,6,14]]}},"container-title":["2018 7th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399137\/8405943\/08406030.pdf?arnumber=8406030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:14:39Z","timestamp":1643199279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/meco.2018.8406030","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}