{"id":"https://openalex.org/W7126052484","doi":"https://doi.org/10.1016/j.softx.2026.102527","title":"IoT-Sim: An interactive platform for designing and securing smart device networks","display_name":"IoT-Sim: An interactive platform for designing and securing smart device networks","publication_year":2026,"publication_date":"2026-01-29","ids":{"openalex":"https://openalex.org/W7126052484","doi":"https://doi.org/10.1016/j.softx.2026.102527"},"language":"en","primary_location":{"id":"doi:10.1016/j.softx.2026.102527","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.softx.2026.102527","pdf_url":null,"source":{"id":"https://openalex.org/S2506067282","display_name":"SoftwareX","issn_l":"2352-7110","issn":["2352-7110"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SoftwareX","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.softx.2026.102527","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120727344","display_name":"Alejandro Diez Bermejo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alejandro Diez Bermejo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124171599","display_name":"Branly Martinez Gonzalez","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Branly Martinez Gonzalez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092716599","display_name":"Beatriz Gil-Arroyo","orcid":"https://orcid.org/0009-0009-8499-093X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Beatriz Gil-Arroyo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124163316","display_name":"Jaime Rinc\u00f3n Arango","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jaime Rinc\u00f3n Arango","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5037345774","display_name":"Daniel Urda","orcid":"https://orcid.org/0000-0003-2662-798X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Urda Mu\u00f1oz","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5120727344"],"corresponding_institution_ids":[],"apc_list":{"value":500,"currency":"USD","value_usd":500},"apc_paid":{"value":500,"currency":"USD","value_usd":500},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2207328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":null,"first_page":"102527","last_page":"102527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3474000096321106,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3474000096321106,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10209999978542328,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.09749999642372131,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.717199981212616},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6812000274658203},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6590999960899353},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6075000166893005},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5286999940872192},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4641000032424927},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4052000045776367},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4002000093460083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842000126838684},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.717199981212616},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6812000274658203},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6590999960899353},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6075000166893005},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5533999800682068},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5286999940872192},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4641000032424927},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4052000045776367},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4002000093460083},{"id":"https://openalex.org/C2776898695","wikidata":"https://www.wikidata.org/wiki/Q11253473","display_name":"Smart device","level":2,"score":0.36970001459121704},{"id":"https://openalex.org/C2780395129","wikidata":"https://www.wikidata.org/wiki/Q1128971","display_name":"Rapid prototyping","level":2,"score":0.34940001368522644},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33469998836517334},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C152223200","wikidata":"https://www.wikidata.org/wiki/Q3055471","display_name":"Smart environment","level":3,"score":0.273499995470047},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26409998536109924}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.softx.2026.102527","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.softx.2026.102527","pdf_url":null,"source":{"id":"https://openalex.org/S2506067282","display_name":"SoftwareX","issn_l":"2352-7110","issn":["2352-7110"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SoftwareX","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9f415fdd13404741b7f90573cd7ccada","is_oa":true,"landing_page_url":"https://doaj.org/article/9f415fdd13404741b7f90573cd7ccada","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"SoftwareX, Vol 33, Iss , Pp 102527- (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.softx.2026.102527","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.softx.2026.102527","pdf_url":null,"source":{"id":"https://openalex.org/S2506067282","display_name":"SoftwareX","issn_l":"2352-7110","issn":["2352-7110"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SoftwareX","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4272126257419586}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2949888934","https://openalex.org/W3020687048","https://openalex.org/W4392168443"],"related_works":[],"abstract_inverted_index":{"The":[0],"IoT-Sim":[1],"is":[2,71],"a":[3,72],"lightweight":[4],"and":[5,12,35,53,63,79],"modular":[6],"tool":[7],"designed":[8],"to":[9,44],"create,":[10],"configure,":[11],"test":[13],"models":[14],"that":[15],"detect":[16],"attacks":[17],"in":[18,65],"Internet":[19],"of":[20,51,82],"Things":[21],"(IoT)":[22],"networks.":[23],"It":[24],"provides":[25],"an":[26,66],"interactive":[27],"environment":[28],"for":[29,75],"simulating":[30],"communication":[31],"among":[32],"connected":[33],"devices":[34],"evaluating":[36],"intrusion":[37],"detection":[38,55],"models.":[39],"This":[40],"framework":[41],"allows":[42],"researchers":[43],"design":[45],"network":[46],"topologies,":[47],"inject":[48],"different":[49],"types":[50],"attacks,":[52],"benchmark":[54],"algorithms":[56],"under":[57],"controlled":[58],"conditions.":[59],"By":[60],"combining":[61],"usability":[62],"flexibility":[64],"open-source":[67],"design,":[68],"the":[69,76],"simulator":[70],"valuable":[73],"resource":[74],"education,":[77],"research,":[78],"rapid":[80],"prototyping":[81],"IoT":[83],"security":[84],"solutions.":[85]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-30T00:00:00"}
