Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/jiot.2021.3056179
With a growing number of embedded devices that create, transform and send data autonomously at its core, the Internet-of-Things (IoT) is a reality in different sectors such as manufacturing, healthcare or transportation. With this expansion, the IoT is becoming more present in critical environments, where security is paramount. Infamous attacks such as Mirai have shown the insecurity of the devices that power the IoT, as well as the potential of such large-scale attacks. Therefore, it is important to secure these embedded systems that form the backbone of the IoT. However, the particular nature of these devices and their resource constraints mean that the most cost-effective manner of securing these devices is to secure them before they are deployed, by minimizing the number of vulnerabilities they ship. To this end, fuzzing has proved itself as a valuable technique for automated vulnerability finding, where specially crafted inputs are fed to programs in order to trigger vulnerabilities and crash the system. In this survey, we link the world of embedded IoT devices and fuzzing. For this end, we list the particularities of the embedded world as far as security is concerned, we perform a literature review on fuzzing techniques and proposals, studying their applicability to embedded IoT devices and, finally, we present future research directions by pointing out the gaps identified in the review.
Related Topics
- Type
- review
- Language
- en
- Landing Page
- https://doi.org/10.1109/jiot.2021.3056179
- https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdf
- OA Status
- hybrid
- Cited By
- 59
- References
- 120
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3128203310
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3128203310Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/jiot.2021.3056179Digital Object Identifier
- Title
-
Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded SystemsWork title
- Type
-
reviewOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-02-03Full publication date if available
- Authors
-
Maialen Eceiza, José Luis Flores, Mikel IturbeList of authors in order
- Landing page
-
https://doi.org/10.1109/jiot.2021.3056179Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdfDirect OA link when available
- Concepts
-
Fuzz testing, Computer science, Computer security, Vulnerability (computing), Internet of Things, Crash, Software, Programming languageTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
59Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 21, 2024: 17, 2023: 13, 2022: 7, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
120Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3128203310 |
|---|---|
| doi | https://doi.org/10.1109/jiot.2021.3056179 |
| ids.doi | https://doi.org/10.1109/jiot.2021.3056179 |
| ids.mag | 3128203310 |
| ids.openalex | https://openalex.org/W3128203310 |
| fwci | 5.47122198 |
| type | review |
| title | Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems |
| biblio.issue | 13 |
| biblio.volume | 8 |
| biblio.last_page | 10411 |
| biblio.first_page | 10390 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T10743 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9980999827384949 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1712 |
| topics[1].subfield.display_name | Software |
| topics[1].display_name | Software Testing and Debugging Techniques |
| topics[2].id | https://openalex.org/T11689 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9961000084877014 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Adversarial Robustness in Machine Learning |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C111065885 |
| concepts[0].level | 3 |
| concepts[0].score | 0.9692779779434204 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1189053 |
| concepts[0].display_name | Fuzz testing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8148695230484009 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.7340958714485168 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C95713431 |
| concepts[3].level | 2 |
| concepts[3].score | 0.714472234249115 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[3].display_name | Vulnerability (computing) |
| concepts[4].id | https://openalex.org/C81860439 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5359511971473694 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[4].display_name | Internet of Things |
| concepts[5].id | https://openalex.org/C183469790 |
| concepts[5].level | 2 |
| concepts[5].score | 0.46500644087791443 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q333501 |
| concepts[5].display_name | Crash |
| concepts[6].id | https://openalex.org/C2777904410 |
| concepts[6].level | 2 |
| concepts[6].score | 0.11670279502868652 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[6].display_name | Software |
| concepts[7].id | https://openalex.org/C199360897 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[7].display_name | Programming language |
| keywords[0].id | https://openalex.org/keywords/fuzz-testing |
| keywords[0].score | 0.9692779779434204 |
| keywords[0].display_name | Fuzz testing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8148695230484009 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.7340958714485168 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/vulnerability |
| keywords[3].score | 0.714472234249115 |
| keywords[3].display_name | Vulnerability (computing) |
| keywords[4].id | https://openalex.org/keywords/internet-of-things |
| keywords[4].score | 0.5359511971473694 |
| keywords[4].display_name | Internet of Things |
| keywords[5].id | https://openalex.org/keywords/crash |
| keywords[5].score | 0.46500644087791443 |
| keywords[5].display_name | Crash |
| keywords[6].id | https://openalex.org/keywords/software |
| keywords[6].score | 0.11670279502868652 |
| keywords[6].display_name | Software |
| language | en |
| locations[0].id | doi:10.1109/jiot.2021.3056179 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2480266640 |
| locations[0].source.issn | 2327-4662, 2372-2541 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2327-4662 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IEEE Internet of Things Journal |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Internet of Things Journal |
| locations[0].landing_page_url | https://doi.org/10.1109/jiot.2021.3056179 |
| locations[1].id | pmh:oai:ebiltegia.mondragon.edu:20.500.11984/5266 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4377196532 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | eRepository Mondragon University (Mondragon University) |
| locations[1].source.host_organization | https://openalex.org/I162361429 |
| locations[1].source.host_organization_name | Mondragon University |
| locations[1].source.host_organization_lineage | https://openalex.org/I162361429 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | info:eu-repo/semantics/acceptedVersion |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Internet of Things Journal. Early Access |
| locations[1].landing_page_url | https://hdl.handle.net/20.500.11984/5266 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5076216328 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7755-2848 |
| authorships[0].author.display_name | Maialen Eceiza |
| authorships[0].countries | ES |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210121514 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Industrial Cybersecurity, IKERLAN Technology Research Center, Basque Research and Technology Alliance, Arrasate-Mondragón, Spain |
| authorships[0].institutions[0].id | https://openalex.org/I4210121514 |
| authorships[0].institutions[0].ror | https://ror.org/02pwsw017 |
| authorships[0].institutions[0].type | facility |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210121514 |
| authorships[0].institutions[0].country_code | ES |
| authorships[0].institutions[0].display_name | GAIKER Technology Centre |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Maialen Eceiza |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Industrial Cybersecurity, IKERLAN Technology Research Center, Basque Research and Technology Alliance, Arrasate-Mondragón, Spain |
| authorships[1].author.id | https://openalex.org/A5035500193 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5555-9712 |
| authorships[1].author.display_name | José Luis Flores |
| authorships[1].countries | ES |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210121514 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Industrial Cybersecurity, IKERLAN Technology Research Center, Basque Research and Technology Alliance, Arrasate-Mondragón, Spain |
| authorships[1].institutions[0].id | https://openalex.org/I4210121514 |
| authorships[1].institutions[0].ror | https://ror.org/02pwsw017 |
| authorships[1].institutions[0].type | facility |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210121514 |
| authorships[1].institutions[0].country_code | ES |
| authorships[1].institutions[0].display_name | GAIKER Technology Centre |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Jose Luis Flores |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Industrial Cybersecurity, IKERLAN Technology Research Center, Basque Research and Technology Alliance, Arrasate-Mondragón, Spain |
| authorships[2].author.id | https://openalex.org/A5050357792 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9641-5646 |
| authorships[2].author.display_name | Mikel Iturbe |
| authorships[2].countries | ES |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I162361429 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computing and Electronics, Faculty of Engineering, Mondragon Unibertsitatea, Arrasate-Mondragón, Spain |
| authorships[2].institutions[0].id | https://openalex.org/I162361429 |
| authorships[2].institutions[0].ror | https://ror.org/00wvqgd19 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I162361429, https://openalex.org/I4210092206 |
| authorships[2].institutions[0].country_code | ES |
| authorships[2].institutions[0].display_name | Mondragon Unibertsitatea |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Mikel Iturbe |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computing and Electronics, Faculty of Engineering, Mondragon Unibertsitatea, Arrasate-Mondragón, Spain |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W4232884709, https://openalex.org/W4385625698, https://openalex.org/W2517087431, https://openalex.org/W3006477812, https://openalex.org/W3021250941, https://openalex.org/W4322716318, https://openalex.org/W3087102429, https://openalex.org/W4225724519, https://openalex.org/W4213078493, https://openalex.org/W2042616262 |
| cited_by_count | 59 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 21 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 17 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 13 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 7 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/jiot.2021.3056179 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2480266640 |
| best_oa_location.source.issn | 2327-4662, 2372-2541 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2327-4662 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | IEEE Internet of Things Journal |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Internet of Things Journal |
| best_oa_location.landing_page_url | https://doi.org/10.1109/jiot.2021.3056179 |
| primary_location.id | doi:10.1109/jiot.2021.3056179 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2480266640 |
| primary_location.source.issn | 2327-4662, 2372-2541 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2327-4662 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IEEE Internet of Things Journal |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6488907/9462546/09344712.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Internet of Things Journal |
| primary_location.landing_page_url | https://doi.org/10.1109/jiot.2021.3056179 |
| publication_date | 2021-02-03 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W1529728259, https://openalex.org/W2971223593, https://openalex.org/W2613257416, https://openalex.org/W2037145115, https://openalex.org/W2044791156, https://openalex.org/W2596636257, https://openalex.org/W2798388185, https://openalex.org/W2795831316, https://openalex.org/W2985896598, https://openalex.org/W27954293, https://openalex.org/W2963846926, https://openalex.org/W4232884709, https://openalex.org/W4230648425, https://openalex.org/W2548565013, https://openalex.org/W2784202677, https://openalex.org/W2156858199, https://openalex.org/W2964097210, https://openalex.org/W2059218484, https://openalex.org/W3160978791, https://openalex.org/W2012170825, https://openalex.org/W2576197287, https://openalex.org/W2791258732, https://openalex.org/W1981331664, https://openalex.org/W2918158412, https://openalex.org/W2701225458, https://openalex.org/W2733765803, https://openalex.org/W89099512, https://openalex.org/W6660077140, https://openalex.org/W1546956568, https://openalex.org/W2532335977, https://openalex.org/W6630124987, https://openalex.org/W2515236103, https://openalex.org/W6637688222, https://openalex.org/W2777046235, https://openalex.org/W2613534458, https://openalex.org/W2964241064, https://openalex.org/W6743674107, https://openalex.org/W2126820083, https://openalex.org/W2998937823, https://openalex.org/W2583649498, https://openalex.org/W2791018263, https://openalex.org/W6685430852, https://openalex.org/W6630436094, https://openalex.org/W2766540688, https://openalex.org/W2042033151, https://openalex.org/W2946419759, https://openalex.org/W2956095933, https://openalex.org/W2529113503, https://openalex.org/W6764065038, https://openalex.org/W2779586541, https://openalex.org/W4241857019, https://openalex.org/W6779448139, https://openalex.org/W6637594488, https://openalex.org/W2598865842, https://openalex.org/W2966065488, https://openalex.org/W2741068848, https://openalex.org/W2128985333, https://openalex.org/W6694582876, https://openalex.org/W2899189777, https://openalex.org/W2517087431, https://openalex.org/W6736939530, https://openalex.org/W2019326155, https://openalex.org/W2576376563, https://openalex.org/W2969468102, https://openalex.org/W2163362445, https://openalex.org/W2002934700, https://openalex.org/W2806377938, https://openalex.org/W2806746626, https://openalex.org/W2574017551, https://openalex.org/W2954282565, https://openalex.org/W6611718138, https://openalex.org/W2957905354, https://openalex.org/W2782780792, https://openalex.org/W2027718224, https://openalex.org/W2128128820, https://openalex.org/W2947182139, https://openalex.org/W2759245396, https://openalex.org/W6606430823, https://openalex.org/W2795192879, https://openalex.org/W2137530017, https://openalex.org/W2924291353, https://openalex.org/W2777430404, https://openalex.org/W1976878954, https://openalex.org/W2115601816, https://openalex.org/W2164866963, https://openalex.org/W4250863246, https://openalex.org/W6745768481, https://openalex.org/W2038244154, https://openalex.org/W3072699177, https://openalex.org/W3099379433, https://openalex.org/W1710734607, https://openalex.org/W4241054193, https://openalex.org/W2274381509, https://openalex.org/W2962918166, https://openalex.org/W2902065464, https://openalex.org/W157156687, https://openalex.org/W1694077306, https://openalex.org/W2510641280, https://openalex.org/W2751862727, https://openalex.org/W2180970301, https://openalex.org/W2908016018, https://openalex.org/W4299915307, https://openalex.org/W3048967426, https://openalex.org/W2469181307, https://openalex.org/W1506510492, https://openalex.org/W2608968506, https://openalex.org/W2768829148, https://openalex.org/W3104446232, https://openalex.org/W1507845365, https://openalex.org/W4297731724, https://openalex.org/W2810572654, https://openalex.org/W2780750120, https://openalex.org/W3104736645, https://openalex.org/W2180600715, https://openalex.org/W348312514, https://openalex.org/W1988524530, https://openalex.org/W2955314308, https://openalex.org/W2153315398, https://openalex.org/W1601461406, https://openalex.org/W2065948900 |
| referenced_works_count | 120 |
| abstract_inverted_index.a | 1, 21, 134, 190 |
| abstract_inverted_index.In | 158 |
| abstract_inverted_index.To | 126 |
| abstract_inverted_index.as | 27, 51, 64, 66, 133, 182, 184 |
| abstract_inverted_index.at | 14 |
| abstract_inverted_index.by | 118, 212 |
| abstract_inverted_index.in | 23, 41, 149, 218 |
| abstract_inverted_index.is | 20, 37, 46, 75, 110, 186 |
| abstract_inverted_index.it | 74 |
| abstract_inverted_index.of | 4, 57, 69, 86, 93, 106, 122, 165, 178 |
| abstract_inverted_index.on | 193 |
| abstract_inverted_index.or | 30 |
| abstract_inverted_index.to | 77, 111, 147, 151, 201 |
| abstract_inverted_index.we | 161, 174, 188, 207 |
| abstract_inverted_index.For | 171 |
| abstract_inverted_index.IoT | 36, 167, 203 |
| abstract_inverted_index.and | 10, 96, 154, 169, 196 |
| abstract_inverted_index.are | 116, 145 |
| abstract_inverted_index.far | 183 |
| abstract_inverted_index.fed | 146 |
| abstract_inverted_index.for | 137 |
| abstract_inverted_index.has | 130 |
| abstract_inverted_index.its | 15 |
| abstract_inverted_index.out | 214 |
| abstract_inverted_index.the | 17, 35, 55, 58, 62, 67, 84, 87, 90, 102, 120, 156, 163, 176, 179, 215, 219 |
| abstract_inverted_index.IoT, | 63 |
| abstract_inverted_index.IoT. | 88 |
| abstract_inverted_index.With | 0, 32 |
| abstract_inverted_index.and, | 205 |
| abstract_inverted_index.data | 12 |
| abstract_inverted_index.end, | 128, 173 |
| abstract_inverted_index.form | 83 |
| abstract_inverted_index.gaps | 216 |
| abstract_inverted_index.have | 53 |
| abstract_inverted_index.link | 162 |
| abstract_inverted_index.list | 175 |
| abstract_inverted_index.mean | 100 |
| abstract_inverted_index.more | 39 |
| abstract_inverted_index.most | 103 |
| abstract_inverted_index.send | 11 |
| abstract_inverted_index.such | 26, 50, 70 |
| abstract_inverted_index.that | 7, 60, 82, 101 |
| abstract_inverted_index.them | 113 |
| abstract_inverted_index.they | 115, 124 |
| abstract_inverted_index.this | 33, 127, 159, 172 |
| abstract_inverted_index.well | 65 |
| abstract_inverted_index.(IoT) | 19 |
| abstract_inverted_index.Mirai | 52 |
| abstract_inverted_index.core, | 16 |
| abstract_inverted_index.crash | 155 |
| abstract_inverted_index.order | 150 |
| abstract_inverted_index.power | 61 |
| abstract_inverted_index.ship. | 125 |
| abstract_inverted_index.shown | 54 |
| abstract_inverted_index.their | 97, 199 |
| abstract_inverted_index.these | 79, 94, 108 |
| abstract_inverted_index.where | 44, 141 |
| abstract_inverted_index.world | 164, 181 |
| abstract_inverted_index.before | 114 |
| abstract_inverted_index.future | 209 |
| abstract_inverted_index.inputs | 144 |
| abstract_inverted_index.itself | 132 |
| abstract_inverted_index.manner | 105 |
| abstract_inverted_index.nature | 92 |
| abstract_inverted_index.number | 3, 121 |
| abstract_inverted_index.proved | 131 |
| abstract_inverted_index.review | 192 |
| abstract_inverted_index.secure | 78, 112 |
| abstract_inverted_index.attacks | 49 |
| abstract_inverted_index.crafted | 143 |
| abstract_inverted_index.create, | 8 |
| abstract_inverted_index.devices | 6, 59, 95, 109, 168, 204 |
| abstract_inverted_index.fuzzing | 129, 194 |
| abstract_inverted_index.growing | 2 |
| abstract_inverted_index.perform | 189 |
| abstract_inverted_index.present | 40, 208 |
| abstract_inverted_index.reality | 22 |
| abstract_inverted_index.review. | 220 |
| abstract_inverted_index.sectors | 25 |
| abstract_inverted_index.survey, | 160 |
| abstract_inverted_index.system. | 157 |
| abstract_inverted_index.systems | 81 |
| abstract_inverted_index.trigger | 152 |
| abstract_inverted_index.However, | 89 |
| abstract_inverted_index.Infamous | 48 |
| abstract_inverted_index.attacks. | 72 |
| abstract_inverted_index.backbone | 85 |
| abstract_inverted_index.becoming | 38 |
| abstract_inverted_index.critical | 42 |
| abstract_inverted_index.embedded | 5, 80, 166, 180, 202 |
| abstract_inverted_index.finally, | 206 |
| abstract_inverted_index.finding, | 140 |
| abstract_inverted_index.fuzzing. | 170 |
| abstract_inverted_index.pointing | 213 |
| abstract_inverted_index.programs | 148 |
| abstract_inverted_index.research | 210 |
| abstract_inverted_index.resource | 98 |
| abstract_inverted_index.securing | 107 |
| abstract_inverted_index.security | 45, 185 |
| abstract_inverted_index.studying | 198 |
| abstract_inverted_index.valuable | 135 |
| abstract_inverted_index.automated | 138 |
| abstract_inverted_index.deployed, | 117 |
| abstract_inverted_index.different | 24 |
| abstract_inverted_index.important | 76 |
| abstract_inverted_index.potential | 68 |
| abstract_inverted_index.specially | 142 |
| abstract_inverted_index.technique | 136 |
| abstract_inverted_index.transform | 9 |
| abstract_inverted_index.Therefore, | 73 |
| abstract_inverted_index.concerned, | 187 |
| abstract_inverted_index.directions | 211 |
| abstract_inverted_index.expansion, | 34 |
| abstract_inverted_index.healthcare | 29 |
| abstract_inverted_index.identified | 217 |
| abstract_inverted_index.insecurity | 56 |
| abstract_inverted_index.literature | 191 |
| abstract_inverted_index.minimizing | 119 |
| abstract_inverted_index.paramount. | 47 |
| abstract_inverted_index.particular | 91 |
| abstract_inverted_index.proposals, | 197 |
| abstract_inverted_index.techniques | 195 |
| abstract_inverted_index.constraints | 99 |
| abstract_inverted_index.large-scale | 71 |
| abstract_inverted_index.autonomously | 13 |
| abstract_inverted_index.applicability | 200 |
| abstract_inverted_index.environments, | 43 |
| abstract_inverted_index.vulnerability | 139 |
| abstract_inverted_index.cost-effective | 104 |
| abstract_inverted_index.manufacturing, | 28 |
| abstract_inverted_index.particularities | 177 |
| abstract_inverted_index.transportation. | 31 |
| abstract_inverted_index.vulnerabilities | 123, 153 |
| abstract_inverted_index.Internet-of-Things | 18 |
| cited_by_percentile_year.max | 100 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.97057318 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |