{"id":"https://openalex.org/W4378364097","doi":"https://doi.org/10.1109/isdfs58141.2023.10131121","title":"Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices","display_name":"Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378364097","doi":"https://doi.org/10.1109/isdfs58141.2023.10131121"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131121","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092023121","display_name":"Matthias Seul","orcid":null},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matthias Seul","raw_affiliation_strings":["Sam Houston State University,Department of Computer Science,Huntsville,TX","Department of Computer Science, Sam Houston State University, Huntsville, TX"],"affiliations":[{"raw_affiliation_string":"Sam Houston State University,Department of Computer Science,Huntsville,TX","institution_ids":["https://openalex.org/I191429286"]},{"raw_affiliation_string":"Department of Computer Science, Sam Houston State University, Huntsville, TX","institution_ids":["https://openalex.org/I191429286"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061796733","display_name":"Cihan Varol","orcid":"https://orcid.org/0000-0002-4940-6808"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Varol","raw_affiliation_strings":["Sam Houston State University,Department of Computer Science,Huntsville,TX","Department of Computer Science, Sam Houston State University, Huntsville, TX"],"affiliations":[{"raw_affiliation_string":"Sam Houston State University,Department of Computer Science,Huntsville,TX","institution_ids":["https://openalex.org/I191429286"]},{"raw_affiliation_string":"Department of Computer Science, Sam Houston State University, Huntsville, TX","institution_ids":["https://openalex.org/I191429286"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092023121"],"corresponding_institution_ids":["https://openalex.org/I191429286"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64721851,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"122","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9526000022888184,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9501000046730042,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8168007135391235},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.6771002411842346},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5739272236824036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5476622581481934},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5104276537895203},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5094645619392395},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4973748028278351},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.46364015340805054},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.41718408465385437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3828800618648529},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34637975692749023},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2874588966369629},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24343809485435486},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1758117973804474},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11620897054672241}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8168007135391235},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.6771002411842346},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5739272236824036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5476622581481934},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5104276537895203},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5094645619392395},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4973748028278351},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.46364015340805054},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.41718408465385437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3828800618648529},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34637975692749023},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2874588966369629},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24343809485435486},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1758117973804474},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11620897054672241},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131121","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2341315448","https://openalex.org/W2889815322","https://openalex.org/W2952719362","https://openalex.org/W3036504108","https://openalex.org/W3038333533","https://openalex.org/W3108696712","https://openalex.org/W3126548626","https://openalex.org/W3195225188","https://openalex.org/W3197757179","https://openalex.org/W6753813437","https://openalex.org/W6764681382"],"related_works":["https://openalex.org/W4313339048","https://openalex.org/W4386004629","https://openalex.org/W3176734149","https://openalex.org/W3201779876","https://openalex.org/W3113627641","https://openalex.org/W4238142035","https://openalex.org/W2918879532","https://openalex.org/W2885461866","https://openalex.org/W3191964704","https://openalex.org/W2901937988"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,8,33,38,72,125],"Things":[3],"(IoT)":[4],"has":[5],"connected":[6,26],"billions":[7],"devices":[9,39],"to":[10,17,63,77,88],"the":[11,31,70,85,89,119,137],"Internet.":[12],"From":[13],"small":[14],"\"smart":[15],"lightbulbs\"":[16],"entire":[18],"aircraft,":[19],"more":[20,22],"and":[21,44,98,104,122],"items":[23],"become":[24],"a":[25,101,110],"device.":[27],"With":[28],"that":[29],"comes":[30],"challenge":[32,55],"keeping":[34],"this":[35,52,54],"new":[36],"class":[37],"in":[40,51],"line":[41],"with":[42,79],"configuration":[43],"security":[45],"standards.":[46],"As":[47],"it":[48],"is":[49,56],"explored":[50],"paper,":[53],"oftentimes":[57],"not":[58,67],"properly":[59],"met.":[60],"Existing":[61],"approaches":[62,95],"compliance":[64,99,123],"either":[65],"do":[66],"fit":[68],"into":[69,118],"constraints":[71],"IoT":[73,90],"environments":[74],"or":[75,134],"struggle":[76],"cope":[78],"their":[80],"scale.":[81],"This":[82,106],"paper":[83,107],"explores":[84],"shifting":[86],"workloads":[87],"nodes,":[91],"leveraging":[92],"peer-to-peer":[93],"based":[94],"for":[96],"verification":[97,112,124],"through":[100],"proof-of-concept":[102],"implementation":[103],"simulation.":[105],"demonstrates":[108],"how":[109],"significant":[111],"workload":[113],"can":[114,127],"effectively":[115],"be":[116,128],"shifted":[117],"peer":[120],"network":[121],"peers":[126],"delegated":[129],"without":[130],"requiring":[131],"special":[132],"knowledge":[133],"software":[135],"on":[136],"nodes":[138],"under":[139],"audit.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
