{"id":"https://openalex.org/W2560411358","doi":"https://doi.org/10.1145/3013520","title":"Internet of Things (IoT)","display_name":"Internet of Things (IoT)","publication_year":2016,"publication_date":"2016-12-07","ids":{"openalex":"https://openalex.org/W2560411358","doi":"https://doi.org/10.1145/3013520","mag":"2560411358"},"language":"en","primary_location":{"id":"doi:10.1145/3013520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3013520","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3013520&type=pdf","source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3013520&type=pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["University of Texas at San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108902190","display_name":"Dimitrios Georgakopolous","orcid":null},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dimitrios Georgakopolous","raw_affiliation_strings":["Swinburne University of Technology, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Victoria, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["CSIRO Data61, Marsfield NSW, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO Data61, Marsfield NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061694501"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":14.2635,"has_fulltext":true,"cited_by_count":136,"citation_normalized_percentile":{"value":0.99232796,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"16","issue":"4","first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7249130606651306},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7001529335975647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6330468058586121},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5760452747344971},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5351306796073914},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.378083199262619},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07855293154716492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7249130606651306},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7001529335975647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6330468058586121},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5760452747344971},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5351306796073914},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.378083199262619},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07855293154716492}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3013520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3013520","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3013520&type=pdf","source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:d2d8771c-b57d-4686-9ab1-9d3bc0c273c8/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/433771","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Transactions on Internet Technology, Vol. 16, no. 4 (Dec 2016), article no. 22","raw_type":""}],"best_oa_location":{"id":"doi:10.1145/3013520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3013520","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3013520&type=pdf","source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2560411358.pdf","grobid_xml":"https://content.openalex.org/works/W2560411358.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W81949417","https://openalex.org/W1607643969","https://openalex.org/W1990852196","https://openalex.org/W2071717677","https://openalex.org/W2095868244","https://openalex.org/W2219414172","https://openalex.org/W2295776812","https://openalex.org/W2365436337","https://openalex.org/W2397981708","https://openalex.org/W2417282157","https://openalex.org/W2418806285","https://openalex.org/W2466440336","https://openalex.org/W2529113503","https://openalex.org/W2559987443","https://openalex.org/W2560185016","https://openalex.org/W2560199134","https://openalex.org/W2560286535","https://openalex.org/W2560683465","https://openalex.org/W2561357874","https://openalex.org/W2566816003","https://openalex.org/W2579546781"],"related_works":["https://openalex.org/W3107196699","https://openalex.org/W4230995856","https://openalex.org/W3110311961","https://openalex.org/W4386107585","https://openalex.org/W3196431560","https://openalex.org/W2552246019","https://openalex.org/W3016154938","https://openalex.org/W2508779374","https://openalex.org/W2972971880","https://openalex.org/W4385452110"],"abstract_inverted_index":{"The":[0,35],"Internet":[1,8,72],"of":[2,15,33,137,149],"Things":[3],"(IoT)":[4],"is":[5,110,155],"the":[6,76,106,139,162],"latest":[7],"evolution":[9,146],"that":[10,109],"incorporates":[11],"a":[12,31,156],"diverse":[13],"range":[14],"things":[16],"such":[17,169],"as":[18,101,170],"sensors,":[19],"actuators,":[20],"and":[21,27,66,84,93,135,145,147],"services":[22,74,79,94,114,121],"deployed":[23,85],"by":[24,38,112],"different":[25],"organizations":[26],"individuals":[28],"to":[29,44,52,97,165],"support":[30],"variety":[32],"applications.":[34],"information":[36],"captured":[37],"IoT":[39,91,120],"present":[40],"an":[41,116,124],"unprecedented":[42],"opportunity":[43],"solve":[45],"large-scale":[46],"problems":[47],"in":[48,75,127,132,173,184],"those":[49,171],"application":[50],"domains":[51],"deliver":[53],"services;":[54],"example":[55],"applications":[56],"include":[57],"precision":[58],"agriculture,":[59],"environment":[60],"monitoring,":[61],"smart":[62,64,67],"health,":[63],"manufacturing,":[65],"cities.":[68],"Like":[69],"all":[70],"other":[71],"based":[73],"past,":[77],"IoT-based":[78],"are":[80,95,181],"also":[81,142,182],"being":[82],"developed":[83],"without":[86],"security":[87],"consideration.":[88],"By":[89],"nature,":[90],"devices":[92],"vulnerable":[96],"malicious":[98,150],"cyber":[99,151],"threats":[100],"they":[102],"cannot":[103],"be":[104],"given":[105],"same":[107],"protection":[108],"received":[111],"enterprise":[113,117],"within":[115],"perimeter.":[118],"While":[119],"will":[122],"play":[123],"important":[125],"role":[126],"our":[128],"daily":[129],"life":[130],"resulting":[131,167],"improved":[133],"productivity":[134],"quality":[136],"life,":[138],"trend":[140],"has":[141],"\u201cencouraged\u201d":[143],"cyber-exploitation":[144],"diversification":[148],"threats.":[152],"Hence,":[153],"there":[154],"need":[157],"for":[158],"coordinated":[159],"efforts":[160],"from":[161],"research":[163,179],"community":[164],"address":[166],"concerns,":[168],"presented":[172],"this":[174,185],"special":[175,186],"section.":[176,187],"Several":[177],"potential":[178],"topics":[180],"identified":[183]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":22},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":25},{"year":2017,"cited_by_count":16},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-12-16T00:00:00"}
