{"id":"https://openalex.org/W2963656859","doi":"https://doi.org/10.1109/giots.2019.8766407","title":"Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems","display_name":"Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2963656859","doi":"https://doi.org/10.1109/giots.2019.8766407","mag":"2963656859"},"language":"en","primary_location":{"id":"doi:10.1109/giots.2019.8766407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035245492","display_name":"Aikaterini Roukounaki","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162098","display_name":"Athens Information Technology","ror":"https://ror.org/05eqt7s39","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210162098"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Aikaterini Roukounaki","raw_affiliation_strings":["Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece"],"affiliations":[{"raw_affiliation_string":"Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece","institution_ids":["https://openalex.org/I4210162098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063921543","display_name":"Sofoklis Efremidis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162098","display_name":"Athens Information Technology","ror":"https://ror.org/05eqt7s39","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210162098"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Sofoklis Efremidis","raw_affiliation_strings":["Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece"],"affiliations":[{"raw_affiliation_string":"Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece","institution_ids":["https://openalex.org/I4210162098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069749526","display_name":"John Soldatos","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162098","display_name":"Athens Information Technology","ror":"https://ror.org/05eqt7s39","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210162098"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"John Soldatos","raw_affiliation_strings":["Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece"],"affiliations":[{"raw_affiliation_string":"Internet of Things Group, Athens Information Technology, 15125 Marousi, Greece","institution_ids":["https://openalex.org/I4210162098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024460526","display_name":"Juergen Neises","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162263","display_name":"Fujitsu (Germany)","ror":"https://ror.org/04max0939","country_code":"DE","type":"company","lineage":["https://openalex.org/I2252096349","https://openalex.org/I4210162263"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Juergen Neises","raw_affiliation_strings":["Enterprise and Cyber Security, Fujitsu Technology Solutions GmbH, M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Enterprise and Cyber Security, Fujitsu Technology Solutions GmbH, M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I4210162263"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009797054","display_name":"Thomas Walloschke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162263","display_name":"Fujitsu (Germany)","ror":"https://ror.org/04max0939","country_code":"DE","type":"company","lineage":["https://openalex.org/I2252096349","https://openalex.org/I4210162263"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Walloschke","raw_affiliation_strings":["Enterprise and Cyber Security, Fujitsu Technology Solutions GmbH, M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Enterprise and Cyber Security, Fujitsu Technology Solutions GmbH, M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I4210162263"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076757847","display_name":"Nikos Kefalakis","orcid":"https://orcid.org/0000-0002-3855-2279"},"institutions":[{"id":"https://openalex.org/I4210134421","display_name":"INTRASOFT International (Luxembourg)","ror":"https://ror.org/02zn9x324","country_code":"LU","type":"company","lineage":["https://openalex.org/I4210134421","https://openalex.org/I86100027"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Nikos Kefalakis","raw_affiliation_strings":["Research and Innovation Development Department, Intrasoft International, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Research and Innovation Development Department, Intrasoft International, Luxembourg","institution_ids":["https://openalex.org/I4210134421"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035245492"],"corresponding_institution_ids":["https://openalex.org/I4210162098"],"apc_list":null,"apc_paid":null,"fwci":8.67,"has_fulltext":false,"cited_by_count":78,"citation_normalized_percentile":{"value":0.98092499,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7878977060317993},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7022693157196045},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5299421548843384},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.49129337072372437},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.46822306513786316},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4666231870651245},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.44964703917503357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44904765486717224},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4469175934791565},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.425650954246521},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.42248135805130005},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1526283621788025},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11982855200767517},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09961619973182678},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.07791757583618164},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07739800214767456}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7878977060317993},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7022693157196045},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5299421548843384},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.49129337072372437},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.46822306513786316},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4666231870651245},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.44964703917503357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44904765486717224},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4469175934791565},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.425650954246521},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.42248135805130005},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1526283621788025},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11982855200767517},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09961619973182678},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.07791757583618164},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07739800214767456},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/giots.2019.8766407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1550815238","https://openalex.org/W2002254092","https://openalex.org/W2029758586","https://openalex.org/W2037026906","https://openalex.org/W2104593144","https://openalex.org/W2117646649","https://openalex.org/W2128569883","https://openalex.org/W2531448500","https://openalex.org/W2612365756","https://openalex.org/W2726105719","https://openalex.org/W2804907169","https://openalex.org/W2892077825","https://openalex.org/W3100857292","https://openalex.org/W6752104184"],"related_works":["https://openalex.org/W2743994248","https://openalex.org/W2009087301","https://openalex.org/W2995566914","https://openalex.org/W2274254580","https://openalex.org/W1688445866","https://openalex.org/W4313182617","https://openalex.org/W3184571894","https://openalex.org/W3208380362","https://openalex.org/W2994070184","https://openalex.org/W3108519568"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"there":[3],"is":[4,37,156],"a":[5,58,132,157],"surge":[6],"of":[7,15,17,40,73,79,97,105,107,134,146],"interest":[8],"in":[9],"approaches":[10,36],"pertaining":[11],"to":[12,127],"security":[13,129,147,162],"issues":[14],"Internet":[16],"Things":[18],"deployments":[19],"and":[20,26,45,52,60,85,92,117,137,144,169],"applications":[21],"that":[22],"leverage":[23],"machine":[24],"learning":[25,28],"deep":[27],"techniques.":[29],"A":[30],"key":[31],"prerequisite":[32],"for":[33,43,65,111,159],"enabling":[34],"such":[35,57],"the":[38,71,98,103,108,142],"development":[39],"scalable":[41,59],"infrastructures":[42],"collecting":[44],"processing":[46],"security-related":[47],"datasets":[48],"from":[49,76,102,131],"IoT":[50,67,80,90,135,153],"systems":[51,136,150],"devices.":[53,138],"This":[54],"paper":[55],"introduces":[56],"configurable":[61],"data":[62,75,114,130,148],"collection":[63,72,149],"infrastructure":[64,100],"data-driven":[66],"security.":[68],"It":[69],"emphasizes":[70],"(security)":[74],"different":[77],"elements":[78],"systems,":[81],"including":[82],"individual":[83],"devices":[84],"smart":[86],"objects,":[87],"edge":[88],"nodes,":[89],"platforms,":[91],"entire":[93],"clouds.":[94],"The":[95,139],"scalability":[96],"introduced":[99],"stems":[101],"integration":[104],"state":[106],"art":[109],"technologies":[110],"large":[112],"scale":[113],"collection,":[115],"streaming":[116],"storage,":[118],"while":[119],"its":[120],"configurability":[121],"relies":[122],"on":[123],"an":[124],"extensible":[125],"approach":[126,140],"modelling":[128],"variety":[133],"enables":[141],"instantiation":[143],"deployment":[145],"over":[151],"complex":[152],"deployments,":[154],"which":[155],"foundation":[158],"applying":[160],"effective":[161],"analytics":[163],"algorithms":[164],"towards":[165],"identifying":[166],"threats,":[167],"vulnerabilities":[168],"related":[170],"attack":[171],"patterns.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":4}],"updated_date":"2026-02-26T06:29:33.603293","created_date":"2025-10-10T00:00:00"}
