{"id":"https://openalex.org/W2888953023","doi":"https://doi.org/10.1109/iwcmc.2018.8450490","title":"Security Challenges Against Cognitive IoT Development","display_name":"Security Challenges Against Cognitive IoT Development","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2888953023","doi":"https://doi.org/10.1109/iwcmc.2018.8450490","mag":"2888953023"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2018.8450490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069886507","display_name":"Lamia Chaari Fourati","orcid":"https://orcid.org/0000-0003-0401-5050"},"institutions":[{"id":"https://openalex.org/I4210119561","display_name":"Digital Research Centre of Sfax","ror":"https://ror.org/02s48dm85","country_code":"TN","type":"facility","lineage":["https://openalex.org/I4210119561"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Lamia Chaari Fourati","raw_affiliation_strings":["LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia"],"affiliations":[{"raw_affiliation_string":"LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia","institution_ids":["https://openalex.org/I4210119561"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108022472","display_name":"Mohamed Fourati","orcid":"https://orcid.org/0000-0003-0432-6553"},"institutions":[{"id":"https://openalex.org/I4210119561","display_name":"Digital Research Centre of Sfax","ror":"https://ror.org/02s48dm85","country_code":"TN","type":"facility","lineage":["https://openalex.org/I4210119561"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Mohamed Fourati","raw_affiliation_strings":["LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia"],"affiliations":[{"raw_affiliation_string":"LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia","institution_ids":["https://openalex.org/I4210119561"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077330828","display_name":"Adel Benmnaouer","orcid":null},"institutions":[{"id":"https://openalex.org/I186129607","display_name":"Canadian University of Dubai","ror":"https://ror.org/029zgsn59","country_code":"AE","type":"education","lineage":["https://openalex.org/I186129607"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Adel Benmnaouer","raw_affiliation_strings":["Canadian University Dubai, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"Canadian University Dubai, Dubai, UAE","institution_ids":["https://openalex.org/I186129607"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069886507"],"corresponding_institution_ids":["https://openalex.org/I4210119561"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64325254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"20","issue":null,"first_page":"1069","last_page":"1073"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7723313570022583},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7452923059463501},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6866050362586975},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.6573610305786133},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6453266143798828},{"id":"https://openalex.org/keywords/cognitive-computing","display_name":"Cognitive computing","score":0.6407322287559509},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5386772751808167},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.46467334032058716},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.446127325296402},{"id":"https://openalex.org/keywords/ambient-intelligence","display_name":"Ambient intelligence","score":0.4374482035636902},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.41764023900032043},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.28603795170783997},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.0924273431301117},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.082893967628479}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7723313570022583},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7452923059463501},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6866050362586975},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.6573610305786133},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6453266143798828},{"id":"https://openalex.org/C92298750","wikidata":"https://www.wikidata.org/wiki/Q17008161","display_name":"Cognitive computing","level":3,"score":0.6407322287559509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5386772751808167},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46467334032058716},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.446127325296402},{"id":"https://openalex.org/C201638289","wikidata":"https://www.wikidata.org/wiki/Q457396","display_name":"Ambient intelligence","level":2,"score":0.4374482035636902},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.41764023900032043},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.28603795170783997},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0924273431301117},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.082893967628479},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2018.8450490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W643378561","https://openalex.org/W1485862348","https://openalex.org/W1507072099","https://openalex.org/W1550815238","https://openalex.org/W1810406100","https://openalex.org/W1837982953","https://openalex.org/W1901936465","https://openalex.org/W2036832046","https://openalex.org/W2038194220","https://openalex.org/W2061469216","https://openalex.org/W2062978452","https://openalex.org/W2068849277","https://openalex.org/W2088213547","https://openalex.org/W2105103777","https://openalex.org/W2139638568","https://openalex.org/W2181578274","https://openalex.org/W2217041328","https://openalex.org/W2241118198","https://openalex.org/W2280304536","https://openalex.org/W2287542032","https://openalex.org/W2298806167","https://openalex.org/W2308814875","https://openalex.org/W2318262939","https://openalex.org/W2341679644","https://openalex.org/W2397456623","https://openalex.org/W2400191671","https://openalex.org/W2403484062","https://openalex.org/W2464780158","https://openalex.org/W2472872709","https://openalex.org/W2473418344","https://openalex.org/W2486903925","https://openalex.org/W2492826358","https://openalex.org/W2507942390","https://openalex.org/W2521311836","https://openalex.org/W2545579647","https://openalex.org/W2549170597","https://openalex.org/W2555541806","https://openalex.org/W2578696390","https://openalex.org/W2591983082","https://openalex.org/W2743965770","https://openalex.org/W2914489676","https://openalex.org/W3098987089","https://openalex.org/W6712472727","https://openalex.org/W6720280083","https://openalex.org/W6722910888","https://openalex.org/W6729411250","https://openalex.org/W7064644503"],"related_works":["https://openalex.org/W2614981836","https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W1538759161","https://openalex.org/W2085980515","https://openalex.org/W3043966885","https://openalex.org/W1532321589","https://openalex.org/W4292019225"],"abstract_inverted_index":{"Internet":[0],"of":[1,40,63],"things":[2],"has":[3],"the":[4,58,61],"ability":[5],"to":[6,36,56,60,72,76,95],"control":[7],"and":[8,21,28,46,49,78,81,91,97,101],"impact":[9],"our":[10],"physical":[11],"world":[12],"through":[13],"technology":[14],"by":[15],"combining":[16],"data":[17],"collected":[18],"from":[19],"sensors":[20],"databases":[22],"along":[23],"with":[24],"mining":[25],"computational":[26],"intelligence":[27,93],"analytics":[29],"within":[30],"IoT":[31,41,53,96],"platforms.":[32],"This":[33],"is":[34,70],"leading":[35],"a":[37],"new":[38,64],"generation":[39],"solutions":[42],"based":[43],"on":[44],"cognition":[45,69,90],"intelligent":[47],"reasoning":[48],"known":[50],"as":[51],"cognitive":[52],"that":[54],"will":[55,88],"paving":[57],"way":[59],"deployment":[62],"powerful":[65],"tools.":[66],"However,":[67],"this":[68,84,86],"susceptible":[71],"heavy":[73],"risks":[74,80],"related":[75],"security":[77],"privacy":[79],"vulnerabilities.":[82],"In":[83],"context,":[85],"study":[87],"identify":[89],"computing":[92],"associated":[94],"highlights":[98],"possible":[99],"threats":[100],"attacks.":[102]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
