{"id":"https://openalex.org/W4236183354","doi":"https://doi.org/10.23919/icact.2018.8323686","title":"IoT security vulnerability: A case study of a Web camera","display_name":"IoT security vulnerability: A case study of a Web camera","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W4236183354","doi":"https://doi.org/10.23919/icact.2018.8323686"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323686","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323686","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026057914","display_name":"Yogeesh Seralathan","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yogeesh Seralathan","raw_affiliation_strings":["College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY United States of America"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY United States of America","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017500181","display_name":"Tae Oh","orcid":"https://orcid.org/0000-0002-6390-8927"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tae Tom Oh","raw_affiliation_strings":["College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY United States of America"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY United States of America","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110923808","display_name":"Suyash Jadhav","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suyash Jadhav","raw_affiliation_strings":["Department of Computing Security, Rochester Institute of Technology, Rochester, NY, United States of America"],"affiliations":[{"raw_affiliation_string":"Department of Computing Security, Rochester Institute of Technology, Rochester, NY, United States of America","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015262154","display_name":"Jonathan Myers","orcid":"https://orcid.org/0000-0003-2592-136X"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Myers","raw_affiliation_strings":["Department of Computing Security, Rochester Institute of Technology, Rochester, NY, United States of America"],"affiliations":[{"raw_affiliation_string":"Department of Computing Security, Rochester Institute of Technology, Rochester, NY, United States of America","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050526299","display_name":"Jaehoon Jeong","orcid":"https://orcid.org/0000-0001-8490-758X"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaehoon Paul Jeong","raw_affiliation_strings":["Department of Interaction, Science Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Interaction, Science Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335093","display_name":"Young Ho Kim","orcid":"https://orcid.org/0000-0002-4284-1874"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Young Ho Kim","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022692529","display_name":"Jeong Neyo Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeong Neyo Kim","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5026057914"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":8.7768,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.98461538,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"172","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8511483669281006},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7837380170822144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7825703620910645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.713658332824707},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6301921010017395},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6019249558448792},{"id":"https://openalex.org/keywords/terabyte","display_name":"Terabyte","score":0.5927736163139343},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5648911595344543},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45803239941596985},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20268738269805908}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8511483669281006},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7837380170822144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7825703620910645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.713658332824707},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6301921010017395},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6019249558448792},{"id":"https://openalex.org/C199683683","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Terabyte","level":2,"score":0.5927736163139343},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5648911595344543},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45803239941596985},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20268738269805908},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323686","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323686","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4230824443","https://openalex.org/W4285325964","https://openalex.org/W2292210693","https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661"],"abstract_inverted_index":{"The":[0,15,65],"Internet":[1],"of":[2,17,71,76,114,131,141,149,164],"Things":[3],"(IoT)":[4],"are":[5,8,57,104],"devices":[6,19,35,46,157],"which":[7,103],"connected":[9],"and":[10,25,47,82,136,151,167],"controlled":[11],"over":[12,23],"the":[13,69,87,124,162],"internet.":[14],"use":[16,70],"IoT":[18,34,45,72,133,156,166],"has":[20],"increased":[21],"exponentially":[22],"time":[24],"knowingly":[26],"or":[27],"unknowingly":[28],"our":[29,90],"data":[30,78],"is":[31,95,117,128],"captured":[32],"by":[33,79],"on":[36,42,62],"a":[37,129,138],"daily":[38],"basis.":[39],"Recent":[40],"news":[41],"malware":[43,154],"targeting":[44],"some":[48],"current":[49],"research":[50],"reveals":[51],"that":[52],"in":[53,68,106],"most":[54],"cases":[55],"there":[56,127],"no":[58],"security":[59,135,170],"controls":[60],"implemented":[61],"these":[63,80],"devices.":[64],"exponential":[66],"rise":[67],"devices,":[73,81],"more":[74],"processing":[75],"sensitive":[77],"their":[83],"mass":[84],"exploitation":[85],"was":[86],"motivation":[88],"behind":[89],"work.":[91],"Malware":[92],"like":[93],"Mirai":[94],"currently":[96],"being":[97],"used":[98,105],"to":[99,111],"build":[100],"large":[101],"botnets":[102],"DDoS":[107],"attacks":[108],"where":[109],"up":[110],"1.2":[112],"Terabytes":[113],"networks":[115],"traffic":[116],"generated":[118],"every":[119],"second.":[120],"We":[121,145,159],"will":[122],"discuss":[123,161],"threats":[125],"when":[126],"compromise":[130],"an":[132,142],"device's":[134],"provide":[137,168],"case":[139],"study":[140],"IP":[143],"camera.":[144],"also":[146],"cover":[147],"aspects":[148],"how":[150],"why":[152],"modern":[153],"targets":[155],"specifically.":[158],"finally":[160],"importance":[163],"securing":[165],"essential":[169],"practices":[171],"for":[172],"mitigating":[173],"device":[174],"exploitation.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":11}],"updated_date":"2026-02-19T06:27:42.648592","created_date":"2025-10-10T00:00:00"}
