{"id":"https://openalex.org/W2899256576","doi":"https://doi.org/10.1109/etfa.2018.8502660","title":"Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems","display_name":"Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2899256576","doi":"https://doi.org/10.1109/etfa.2018.8502660","mag":"2899256576"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2018.8502660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035500193","display_name":"Jos\u00e9 Luis Flores","orcid":"https://orcid.org/0000-0002-5555-9712"},"institutions":[{"id":"https://openalex.org/I4210140267","display_name":"Ikerlan","ror":"https://ror.org/03hp1m080","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210140267"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jose Luis Flores","raw_affiliation_strings":["Dependable Embedded Systems Area, IK4-Ikerlan Technology Research Centre, Mondragon, Spain"],"affiliations":[{"raw_affiliation_string":"Dependable Embedded Systems Area, IK4-Ikerlan Technology Research Centre, Mondragon, Spain","institution_ids":["https://openalex.org/I4210140267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049439811","display_name":"Imanol Mugarza","orcid":"https://orcid.org/0000-0002-6311-0632"},"institutions":[{"id":"https://openalex.org/I4210140267","display_name":"Ikerlan","ror":"https://ror.org/03hp1m080","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210140267"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Imanol Mugarza","raw_affiliation_strings":["Dependable Embedded Systems Area, IK4-Ikerlan Technology Research Centre, Mondragon, Spain"],"affiliations":[{"raw_affiliation_string":"Dependable Embedded Systems Area, IK4-Ikerlan Technology Research Centre, Mondragon, Spain","institution_ids":["https://openalex.org/I4210140267"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035500193"],"corresponding_institution_ids":["https://openalex.org/I4210140267"],"apc_list":null,"apc_paid":null,"fwci":0.5895,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72462226,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"948","last_page":"955"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7128099799156189},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6955721378326416},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6453888416290283},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.578246533870697},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5121240615844727},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4972284138202667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4860239624977112},{"id":"https://openalex.org/keywords/service-discovery","display_name":"Service discovery","score":0.4254840016365051},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3703875243663788},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.29511207342147827},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11357936263084412}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7128099799156189},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6955721378326416},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6453888416290283},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.578246533870697},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5121240615844727},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4972284138202667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4860239624977112},{"id":"https://openalex.org/C144097018","wikidata":"https://www.wikidata.org/wiki/Q4329404","display_name":"Service discovery","level":3,"score":0.4254840016365051},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3703875243663788},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.29511207342147827},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11357936263084412},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2018.8502660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W7586523","https://openalex.org/W116656696","https://openalex.org/W157156687","https://openalex.org/W1550115315","https://openalex.org/W1619258821","https://openalex.org/W1911778649","https://openalex.org/W2000414759","https://openalex.org/W2008954400","https://openalex.org/W2036894992","https://openalex.org/W2039427951","https://openalex.org/W2042033151","https://openalex.org/W2056417188","https://openalex.org/W2084044852","https://openalex.org/W2406832754","https://openalex.org/W2670901730","https://openalex.org/W3083105620","https://openalex.org/W3160978791","https://openalex.org/W3186276894","https://openalex.org/W4240738830","https://openalex.org/W6600290226","https://openalex.org/W6606430823","https://openalex.org/W6713567108","https://openalex.org/W6798681010"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W3076529025","https://openalex.org/W3212933010","https://openalex.org/W4390610562","https://openalex.org/W3182070348"],"abstract_inverted_index":{"The":[0,76],"IoT":[1,113],"and":[2,19,31,95,109,114],"IIoT":[3,115],"paradigms":[4],"are":[5,86,130,139],"creating":[6],"new":[7,16],"business":[8],"opportunities.":[9],"However,":[10],"high-interconnectivity":[11],"among":[12,89],"all":[13,90],"objects":[14],"introduce":[15],"security":[17,40,49,57,84,137],"concerns":[18],"challenges.":[20],"Security":[21,29],"is":[22,42,60,73,82,107,124],"not":[23],"a":[24,27,39,44,68],"product,":[25],"but":[26],"process.":[28],"tests":[30,85],"audits":[32],"have":[33],"to":[34,118],"constantly":[35],"be":[36,52,63],"accomplished.":[37],"Once":[38],"flaw":[41],"detected,":[43],"software":[45],"patch":[46],"fixing":[47],"the":[48,79,91,98,102,112,119,136],"weakness":[50],"could":[51],"then":[53],"produced.":[54],"This":[55],"continuous":[56],"evaluation,":[58],"which":[59],"iterative,":[61],"might":[62],"expensive.":[64],"In":[65],"this":[66],"paper,":[67],"novel":[69],"vulnerability":[70],"discovery":[71],"approach":[72],"presented:":[74],"Hadros.":[75],"particularity":[77],"of":[78,101],"proposed":[80],"design":[81],"that":[83,121],"distributively":[87],"executed":[88],"deployed":[92],"IoT/IIoT":[93],"nodes":[94],"performed":[96],"at":[97],"idle":[99],"time":[100],"system,":[103],"while":[104],"runtime.":[105],"Hadros":[106],"suitable":[108],"advantageous":[110],"for":[111],"era,":[116],"due":[117],"fact":[120],"testing":[122],"coverage":[123],"broadly":[125],"increased":[126],"as":[127],"more":[128],"devices":[129],"incorporated.":[131],"Meanwhile,":[132],"resources":[133],"employed":[134],"by":[135],"researchers":[138],"also":[140],"significantly":[141],"reduced.":[142]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
