{"id":"https://openalex.org/W4406348793","doi":"https://doi.org/10.1016/j.cose.2024.104286","title":"A case of smart devices that compromise home cybersecurity","display_name":"A case of smart devices that compromise home cybersecurity","publication_year":2025,"publication_date":"2025-01-14","ids":{"openalex":"https://openalex.org/W4406348793","doi":"https://doi.org/10.1016/j.cose.2024.104286"},"language":"en","primary_location":{"id":"doi:10.1016/j.cose.2024.104286","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2024.104286","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.cose.2024.104286","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092452911","display_name":"Davide Bonaventura","orcid":null},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Davide Bonaventura","raw_affiliation_strings":["Universit\u00e0 di Catania, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062886919","display_name":"Sergio Esposito","orcid":"https://orcid.org/0000-0001-9904-9821"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Sergio Esposito","raw_affiliation_strings":["Universit\u00e0 di Catania, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051511023","display_name":"Giampaolo Bella","orcid":"https://orcid.org/0000-0002-7615-8643"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giampaolo Bella","raw_affiliation_strings":["Universit\u00e0 di Catania, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092452911"],"corresponding_institution_ids":["https://openalex.org/I39063666"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":{"value":3190,"currency":"USD","value_usd":3190},"fwci":9.7524,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97050275,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"151","issue":null,"first_page":"104286","last_page":"104286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.8867074847221375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.766921877861023},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6660147905349731},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07567843794822693},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.049007564783096313}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.8867074847221375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.766921877861023},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6660147905349731},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07567843794822693},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.049007564783096313}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.cose.2024.104286","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2024.104286","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.cose.2024.104286","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2024.104286","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2768696376","https://openalex.org/W2951694401","https://openalex.org/W3012094546","https://openalex.org/W3014765529","https://openalex.org/W4229032576","https://openalex.org/W4241155088","https://openalex.org/W4285721879","https://openalex.org/W4297348620","https://openalex.org/W4313022588","https://openalex.org/W4313479771","https://openalex.org/W4366977512","https://openalex.org/W4400577153","https://openalex.org/W4402522034","https://openalex.org/W6761891260","https://openalex.org/W6767162252","https://openalex.org/W6767561260","https://openalex.org/W6780872471","https://openalex.org/W6848172693","https://openalex.org/W6854375603"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239"],"abstract_inverted_index":{"The":[0],"importance":[1],"of":[2,23,57,75,123,170,219],"cybersecurity":[3,71],"is":[4,17,33,72,108],"widely":[5],"acknowledged":[6],"as":[7,165,167,186],"paramount":[8],"for":[9,39,41,51,53],"virtually":[10],"every":[11],"computerized":[12],"application":[13],"domain.":[14],"Not":[15],"only":[16,202],"it":[18,32,107],"concerned":[19],"with":[20,196],"the":[21,55,67,115,121,124,157,171,204],"protection":[22],"digital":[24],"assets":[25],"and":[26,46,144],"resources":[27],"from":[28],"illegitimate":[29],"use,":[30],"but":[31],"also":[34,93,162],"essential":[35],"to":[36,48,69,97],"people\u2019s":[37],"privacy,":[38],"example":[40,52],"shielding":[42],"their":[43,49],"personal":[44],"data,":[45],"even":[47],"safety,":[50],"safeguarding":[54],"functioning":[56],"devices":[58,77,82,113,154,169],"that":[59,87,110,140,164],"may":[60],"potentially":[61],"harm":[62],"humans.":[63],"This":[64],"article":[65],"investigates":[66],"extent":[68],"which":[70,84,129,183],"properly":[73],"ensured":[74],"IoT":[76],"(also":[78],"commonly":[79,104],"termed":[80],"smart":[81],")":[83,181],"are":[85],"modern,":[86],"is,":[88],"trendy":[89],"at":[90,135],"present,":[91],"then":[92],"inexpensive,":[94],"hence":[95],"useful":[96],"evaluate":[98],"a":[99],"price-cybersecurity":[100],"ratio,":[101],"and,":[102],"finally,":[103],"used.":[105],"While":[106],"clear":[109],"innumerable":[111],"such":[112,153],"exist,":[114],"findings":[116,138],"reported":[117],"below":[118],"focus":[119],"on":[120,152,189],"case":[122],"Tapo":[125],"ecosystem":[126,173],"by":[127,155],"TP-Link,":[128,197],"features":[130],"cheap":[131],"Amazon":[132],"best":[133],"sellers":[134],"present.":[136],"Our":[137],"suggest":[139],"effective":[141],"Vulnerability":[142],"Assessment":[143],"Penetration":[145],"Testing":[146],"sessions":[147],"can":[148],"be":[149],"carried":[150],"out":[151],"following":[156],"PETIoT":[158],"kill":[159],"chain.":[160],"Findings":[161],"demonstrate":[163],"many":[166],"six":[168],"TAPO":[172],"suffer":[174],"four":[175,187],"previously":[176],"unknown":[177],"(so":[178],"called":[179],"zero-day":[180],"vulnerabilities,":[182],"we":[184],"filed":[185],"CVEs":[188],"MITRE\u2019s":[190],"public":[191],"database.":[192],"Following":[193],"Responsible":[194],"Disclosure":[195],"vulnerabilities":[198,210],"were":[199,211],"publicly":[200],"disclosed":[201],"after":[203],"vendor":[205],"released":[206],"appropriate":[207],"fixes.":[208],"All":[209],"found":[212],"using":[213],"freeware,":[214],"requiring":[215],"over":[216],"600":[217],"lines":[218],"exploitation":[220],"code.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
