{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:52:05Z","timestamp":1730296325455,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,25]]},"DOI":"10.1109\/siot60039.2023.10390013","type":"proceedings-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T18:22:11Z","timestamp":1705515731000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Using Experimentation to Evaluate Security Requirements in IoT Software Systems"],"prefix":"10.1109","author":[{"given":"Bruno Pedra\u00e7a","family":"de Souza","sequence":"first","affiliation":[{"name":"Federal University of Rio de Janeiro,COPPE\/UFRJ,Rio de Janeiro,Brazil"}]},{"given":"Bruno Dantas","family":"de Paiva","sequence":"additional","affiliation":[{"name":"Federal University of Rio de Janeiro,COPPE\/UFRJ,Rio de Janeiro,Brazil"}]},{"given":"Guilherme Horta","family":"Travassos","sequence":"additional","affiliation":[{"name":"Federal University of Rio de Janeiro,COPPE\/UFRJ,Rio de Janeiro,Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3266237.3266263"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106937"},{"article-title":"Information technology - Security techniques - Information security management systems - Overview and vocabulary","volume-title":"International Organization for Standardization (ISO)","year":"2018","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111137"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/3320326.3320402","article-title":"Study the different security threats on the Internet of Things and their applications","volume-title":"Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19","author":"Sahmi","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590841"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04461-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIPTM54933.2022.9754215"},{"journal-title":"Systems and Software Quality Requirements and Evaluation (SQuaRE) System and software quality models","key":"ref9","article-title":"International Organization for Standardization 2020 ISO\/IEC 25010:2011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614993"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.03.034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s20205897"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35333-9_36"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.63"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281295"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2316\/P.2013.796-008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2018.00062"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.111094748"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5753\/cibse.2022.20959"},{"article-title":"Towards a framework for testing the security of loT devices consistently","volume-title":"Emerging Technologies for Authorization and Authentication: First International Workshop, ETAA 2018","author":"Gurjan","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3592813.3592927"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3571473.3571495"},{"key":"ref24","first-page":"528","article-title":"The goal question metric approach","volume":"2","author":"Basili","year":"1994","journal-title":"Encycl. Softw. Eng."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3356317.3356326"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110781"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417039"}],"event":{"name":"2023 Symposium on Internet of Things (SIoT)","start":{"date-parts":[[2023,10,25]]},"location":"S\u00e3o Paulo, Brazil","end":{"date-parts":[[2023,10,27]]}},"container-title":["2023 Symposium on Internet of Things (SIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10389805\/10389838\/10390013.pdf?arnumber=10390013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:14:56Z","timestamp":1705688096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10390013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,25]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/siot60039.2023.10390013","relation":{},"subject":[],"published":{"date-parts":[[2023,10,25]]}}}