{"id":"https://openalex.org/W4390098515","doi":"https://doi.org/10.1109/commnet60167.2023.10365313","title":"David and Goliath: Asymmetric Advantage in MIoT","display_name":"David and Goliath: Asymmetric Advantage in MIoT","publication_year":2023,"publication_date":"2023-12-11","ids":{"openalex":"https://openalex.org/W4390098515","doi":"https://doi.org/10.1109/commnet60167.2023.10365313"},"language":"en","primary_location":{"id":"doi:10.1109/commnet60167.2023.10365313","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/commnet60167.2023.10365313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/356695525/David_and_Goliath_Asymmetric_Advantage_in_MIoT_1_.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062407436","display_name":"Gabriele Oligeri","orcid":"https://orcid.org/0000-0002-9637-0430"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]},{"id":"https://openalex.org/I92528248","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05","country_code":"QA","type":"funder","lineage":["https://openalex.org/I92528248"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Gabriele Oligeri","raw_affiliation_strings":["Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]},{"raw_affiliation_string":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088679207","display_name":"Savio Sciancalepore","orcid":"https://orcid.org/0000-0003-0974-3639"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Savio Sciancalepore","raw_affiliation_strings":["Eindhoven University of Technology,Eindhoven,The Netherlands","Eindhoven University of Technology, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063803574","display_name":"Alireza Sadighian","orcid":"https://orcid.org/0000-0001-5244-7726"},"institutions":[{"id":"https://openalex.org/I92528248","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05","country_code":"QA","type":"funder","lineage":["https://openalex.org/I92528248"]},{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Alireza Sadighian","raw_affiliation_strings":["Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]},{"raw_affiliation_string":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062407436"],"corresponding_institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21546147,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"78","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6992123126983643},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6687285900115967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6569336652755737},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5746910572052002},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5436841249465942},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.46645301580429077},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.45040732622146606},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44328927993774414},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.442943811416626},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3965872526168823},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20511093735694885},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14797624945640564},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.1030363142490387},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08585372567176819}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6992123126983643},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6687285900115967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6569336652755737},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5746910572052002},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5436841249465942},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.46645301580429077},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.45040732622146606},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44328927993774414},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.442943811416626},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3965872526168823},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20511093735694885},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14797624945640564},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.1030363142490387},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08585372567176819},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/commnet60167.2023.10365313","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/commnet60167.2023.10365313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/74f82566-3bc1-4514-86af-d97c8d0d7773","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/74f82566-3bc1-4514-86af-d97c8d0d7773","pdf_url":"https://pure.tue.nl/ws/files/356695525/David_and_Goliath_Asymmetric_Advantage_in_MIoT_1_.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oligeri, G, Sciancalepore, S & Sadighian, A 2023, David and Goliath : Asymmetric Advantage in MIoT. in F El Bouanani & F Ayoub (eds), 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023., 10365313, Institute of Electrical and Electronics Engineers, 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, 11/12/23. https://doi.org/10.1109/CommNet60167.2023.10365313","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/74f82566-3bc1-4514-86af-d97c8d0d7773","is_oa":true,"landing_page_url":"https://research.tue.nl/files/356695525/David_and_Goliath_Asymmetric_Advantage_in_MIoT_1_.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oligeri, G, Sciancalepore, S & Sadighian, A 2023, David and Goliath : Asymmetric Advantage in MIoT. in F El Bouanani & F Ayoub (eds), 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023., 10365313, Institute of Electrical and Electronics Engineers, 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, 11/12/23. https://doi.org/10.1109/CommNet60167.2023.10365313","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:publications/74f82566-3bc1-4514-86af-d97c8d0d7773","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/74f82566-3bc1-4514-86af-d97c8d0d7773","pdf_url":"https://pure.tue.nl/ws/files/356695525/David_and_Goliath_Asymmetric_Advantage_in_MIoT_1_.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oligeri, G, Sciancalepore, S & Sadighian, A 2023, David and Goliath : Asymmetric Advantage in MIoT. in F El Bouanani & F Ayoub (eds), 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023., 10365313, Institute of Electrical and Electronics Engineers, 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, 11/12/23. https://doi.org/10.1109/CommNet60167.2023.10365313","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1273139558","display_name":null,"funder_award_id":"NPRP12C-0814-190012","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"},{"id":"https://openalex.org/G3916883130","display_name":null,"funder_award_id":"NPRP12C-0814-190012-SP165","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"}],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390098515.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W71050201","https://openalex.org/W566554548","https://openalex.org/W2097798345","https://openalex.org/W2245947029","https://openalex.org/W2528296880","https://openalex.org/W2586498481","https://openalex.org/W2586587846","https://openalex.org/W2752444594","https://openalex.org/W2921575989","https://openalex.org/W2945504560","https://openalex.org/W2946595002","https://openalex.org/W2963398124","https://openalex.org/W2982214571","https://openalex.org/W2997542111","https://openalex.org/W3016446294","https://openalex.org/W3036509849","https://openalex.org/W3106100950","https://openalex.org/W3199182217","https://openalex.org/W3203574068","https://openalex.org/W3207840122","https://openalex.org/W3216681046","https://openalex.org/W4285305536","https://openalex.org/W4288738279","https://openalex.org/W4289334519","https://openalex.org/W4308036518","https://openalex.org/W4361186286","https://openalex.org/W4385447218","https://openalex.org/W6616087495","https://openalex.org/W6746397050"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"Modern":[0],"battlefields":[1],"are":[2],"experiencing":[3],"an":[4],"increased":[5],"dependency":[6],"on":[7],"smart":[8],"devices":[9],"that":[10,95],"can":[11,46,84,96],"sense,":[12],"process,":[13],"and":[14,30,44,75,88],"communicate":[15],"data,":[16],"also":[17],"known":[18],"as":[19],"the":[20,48,57,65],"Military":[21],"Internet":[22],"of":[23,50,68],"Things":[24],"(MIoT)":[25],"architecture.":[26],"While":[27],"MIoT":[28,69],"supports":[29],"enhances":[31],"situation":[32],"awareness,":[33],"it":[34],"opens":[35],"up":[36],"new":[37],"cyber":[38,93],"attacks":[39,94],"that,":[40],"when":[41],"properly":[42],"designed":[43],"deployed,":[45],"affect":[47],"safety":[49],"military":[51,106],"operators.In":[52],"this":[53],"work,":[54],"we":[55],"discuss":[56],"trade-off":[58],"between":[59],"two":[60],"opposite":[61],"phenomena":[62],"caused":[63],"by":[64],"massive":[66],"deployment":[67],"in":[70],"modern":[71],"battlefields:":[72],"situational":[73],"awareness":[74],"asymmetric":[76],"advantage.":[77],"We":[78],"highlight":[79],"how":[80],"a":[81],"resource-constrained":[82],"adversary":[83],"resort":[85],"to":[86,91,104],"simple":[87],"effective":[89],"tactics":[90],"deploy":[92],"have":[97],"either":[98],"short-term":[99],"effects":[100],"or":[101],"be":[102],"detrimental":[103],"strategic":[105],"objectives.":[107]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
