Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1016/j.cose.2023.103685
The Internet of Things (IoT) has become increasingly prevalent in various aspects of our lives, enabling billions of devices to connect and communicate seamlessly. However, the intricate nature of IoT connections and device vulnerabilities exposes the devices to security threats. To address the security challenges, we propose a proactive defense framework that leverages a model-based approach for security analysis and facilitates the defense strategies. Our proposed approach incorporates proactive defense mechanisms that combine Moving Target Defense techniques with cyber deception. The proposed approach involves the use of a decoy nodes as a deception technique and operating system based diversity as a moving target defense strategy to change the attack surface area of IoT networks. Additionally, we introduce a technique known as Important Measure-based Operating System Diversity to reduce defense cost. The effectiveness of the defense mechanisms was evaluated by using a graphical security model in a Software Defined Networking-based IoT network. Simulation results demonstrate the effectiveness of our approach in mitigating the impact of attacks while maintaining high performance levels in IoT networks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.cose.2023.103685
- OA Status
- hybrid
- Cited By
- 39
- References
- 97
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4390535926
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4390535926Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.cose.2023.103685Digital Object Identifier
- Title
-
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deceptionWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-01-03Full publication date if available
- Authors
-
Zubaida Rehman, Iqbal Gondal, Mengmeng Ge, Hai Dong, Mark Gregory, Zahir TariList of authors in order
- Landing page
-
https://doi.org/10.1016/j.cose.2023.103685Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.cose.2023.103685Direct OA link when available
- Concepts
-
Deception, Computer science, Computer security, Attack surface, Honeypot, Decoy, Internet of Things, Receptor, Chemistry, Social psychology, Psychology, BiochemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
39Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 24, 2024: 15Per-year citation counts (last 5 years)
- References (count)
-
97Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4390535926 |
|---|---|
| doi | https://doi.org/10.1016/j.cose.2023.103685 |
| ids.doi | https://doi.org/10.1016/j.cose.2023.103685 |
| ids.openalex | https://openalex.org/W4390535926 |
| fwci | 32.63777793 |
| type | article |
| title | Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception |
| biblio.issue | |
| biblio.volume | 139 |
| biblio.last_page | 103685 |
| biblio.first_page | 103685 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10714 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9994000196456909 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Software-Defined Networks and 5G |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9994000196456909 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list.value | 3190 |
| apc_list.currency | USD |
| apc_list.value_usd | 3190 |
| apc_paid.value | 3190 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 3190 |
| concepts[0].id | https://openalex.org/C2779267917 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8330165147781372 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q170028 |
| concepts[0].display_name | Deception |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8099656701087952 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.7336317300796509 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C2776576444 |
| concepts[3].level | 2 |
| concepts[3].score | 0.7201780080795288 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q303569 |
| concepts[3].display_name | Attack surface |
| concepts[4].id | https://openalex.org/C191267431 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5904496908187866 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q911932 |
| concepts[4].display_name | Honeypot |
| concepts[5].id | https://openalex.org/C2779179475 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5586308240890503 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3545649 |
| concepts[5].display_name | Decoy |
| concepts[6].id | https://openalex.org/C81860439 |
| concepts[6].level | 2 |
| concepts[6].score | 0.544414222240448 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[6].display_name | Internet of Things |
| concepts[7].id | https://openalex.org/C170493617 |
| concepts[7].level | 2 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q208467 |
| concepts[7].display_name | Receptor |
| concepts[8].id | https://openalex.org/C185592680 |
| concepts[8].level | 0 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2329 |
| concepts[8].display_name | Chemistry |
| concepts[9].id | https://openalex.org/C77805123 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q161272 |
| concepts[9].display_name | Social psychology |
| concepts[10].id | https://openalex.org/C15744967 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[10].display_name | Psychology |
| concepts[11].id | https://openalex.org/C55493867 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7094 |
| concepts[11].display_name | Biochemistry |
| keywords[0].id | https://openalex.org/keywords/deception |
| keywords[0].score | 0.8330165147781372 |
| keywords[0].display_name | Deception |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8099656701087952 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.7336317300796509 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/attack-surface |
| keywords[3].score | 0.7201780080795288 |
| keywords[3].display_name | Attack surface |
| keywords[4].id | https://openalex.org/keywords/honeypot |
| keywords[4].score | 0.5904496908187866 |
| keywords[4].display_name | Honeypot |
| keywords[5].id | https://openalex.org/keywords/decoy |
| keywords[5].score | 0.5586308240890503 |
| keywords[5].display_name | Decoy |
| keywords[6].id | https://openalex.org/keywords/internet-of-things |
| keywords[6].score | 0.544414222240448 |
| keywords[6].display_name | Internet of Things |
| language | en |
| locations[0].id | doi:10.1016/j.cose.2023.103685 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S12529635 |
| locations[0].source.issn | 0167-4048, 1872-6208 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0167-4048 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computers & Security |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computers & Security |
| locations[0].landing_page_url | https://doi.org/10.1016/j.cose.2023.103685 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5030994788 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5825-3498 |
| authorships[0].author.display_name | Zubaida Rehman |
| authorships[0].countries | AU |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I82951845 |
| authorships[0].affiliations[0].raw_affiliation_string | RMIT University, Australia |
| authorships[0].institutions[0].id | https://openalex.org/I82951845 |
| authorships[0].institutions[0].ror | https://ror.org/04ttjf776 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I82951845 |
| authorships[0].institutions[0].country_code | AU |
| authorships[0].institutions[0].display_name | RMIT University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Zubaida Rehman |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | RMIT University, Australia |
| authorships[1].author.id | https://openalex.org/A5003563704 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7963-2446 |
| authorships[1].author.display_name | Iqbal Gondal |
| authorships[1].countries | AU |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I82951845 |
| authorships[1].affiliations[0].raw_affiliation_string | RMIT University, Australia |
| authorships[1].institutions[0].id | https://openalex.org/I82951845 |
| authorships[1].institutions[0].ror | https://ror.org/04ttjf776 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I82951845 |
| authorships[1].institutions[0].country_code | AU |
| authorships[1].institutions[0].display_name | RMIT University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Iqbal Gondal |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | RMIT University, Australia |
| authorships[2].author.id | https://openalex.org/A5101903526 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2869-4203 |
| authorships[2].author.display_name | Mengmeng Ge |
| authorships[2].countries | NZ |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I185492890 |
| authorships[2].affiliations[0].raw_affiliation_string | University of Canterbury, New Zealand |
| authorships[2].institutions[0].id | https://openalex.org/I185492890 |
| authorships[2].institutions[0].ror | https://ror.org/03y7q9t39 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I185492890 |
| authorships[2].institutions[0].country_code | NZ |
| authorships[2].institutions[0].display_name | University of Canterbury |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mengmeng Ge |
| authorships[2].is_corresponding | True |
| authorships[2].raw_affiliation_strings | University of Canterbury, New Zealand |
| authorships[3].author.id | https://openalex.org/A5005267734 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-7033-5688 |
| authorships[3].author.display_name | Hai Dong |
| authorships[3].countries | AU |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I82951845 |
| authorships[3].affiliations[0].raw_affiliation_string | RMIT University, Australia |
| authorships[3].institutions[0].id | https://openalex.org/I82951845 |
| authorships[3].institutions[0].ror | https://ror.org/04ttjf776 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I82951845 |
| authorships[3].institutions[0].country_code | AU |
| authorships[3].institutions[0].display_name | RMIT University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Hai Dong |
| authorships[3].is_corresponding | True |
| authorships[3].raw_affiliation_strings | RMIT University, Australia |
| authorships[4].author.id | https://openalex.org/A5057587489 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4631-6468 |
| authorships[4].author.display_name | Mark Gregory |
| authorships[4].countries | AU |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I82951845 |
| authorships[4].affiliations[0].raw_affiliation_string | RMIT University, Australia |
| authorships[4].institutions[0].id | https://openalex.org/I82951845 |
| authorships[4].institutions[0].ror | https://ror.org/04ttjf776 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I82951845 |
| authorships[4].institutions[0].country_code | AU |
| authorships[4].institutions[0].display_name | RMIT University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Mark Gregory |
| authorships[4].is_corresponding | True |
| authorships[4].raw_affiliation_strings | RMIT University, Australia |
| authorships[5].author.id | https://openalex.org/A5054836950 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-1235-9673 |
| authorships[5].author.display_name | Zahir Tari |
| authorships[5].countries | AU |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I82951845 |
| authorships[5].affiliations[0].raw_affiliation_string | RMIT University, Australia |
| authorships[5].institutions[0].id | https://openalex.org/I82951845 |
| authorships[5].institutions[0].ror | https://ror.org/04ttjf776 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I82951845 |
| authorships[5].institutions[0].country_code | AU |
| authorships[5].institutions[0].display_name | RMIT University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Zahir Tari |
| authorships[5].is_corresponding | True |
| authorships[5].raw_affiliation_strings | RMIT University, Australia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.cose.2023.103685 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2350724208, https://openalex.org/W2000018903, https://openalex.org/W3142690625, https://openalex.org/W1534090575, https://openalex.org/W2360866534, https://openalex.org/W2372392697, https://openalex.org/W4312961703, https://openalex.org/W2362932354, https://openalex.org/W2391396896, https://openalex.org/W3003960714 |
| cited_by_count | 39 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 24 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 15 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.cose.2023.103685 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S12529635 |
| best_oa_location.source.issn | 0167-4048, 1872-6208 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0167-4048 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computers & Security |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computers & Security |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.cose.2023.103685 |
| primary_location.id | doi:10.1016/j.cose.2023.103685 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S12529635 |
| primary_location.source.issn | 0167-4048, 1872-6208 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0167-4048 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computers & Security |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computers & Security |
| primary_location.landing_page_url | https://doi.org/10.1016/j.cose.2023.103685 |
| publication_date | 2024-01-03 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W3200022502, https://openalex.org/W6604389561, https://openalex.org/W6754670049, https://openalex.org/W6746163428, https://openalex.org/W2988164393, https://openalex.org/W6766971805, https://openalex.org/W6739063050, https://openalex.org/W6649251045, https://openalex.org/W6775723652, https://openalex.org/W6808112018, https://openalex.org/W6668201909, https://openalex.org/W2584217814, https://openalex.org/W1965968818, https://openalex.org/W6746356247, https://openalex.org/W2950965276, https://openalex.org/W6786129892, https://openalex.org/W2986455874, https://openalex.org/W2553733554, https://openalex.org/W2911505293, https://openalex.org/W4285543236, https://openalex.org/W2996903041, https://openalex.org/W4242345171, https://openalex.org/W6741713155, https://openalex.org/W2945639270, https://openalex.org/W6750739499, https://openalex.org/W6632796370, https://openalex.org/W6683007185, https://openalex.org/W1517229197, https://openalex.org/W3200064363, https://openalex.org/W2580334929, https://openalex.org/W2913201620, https://openalex.org/W2994779073, https://openalex.org/W6758180715, https://openalex.org/W2951694401, https://openalex.org/W6604784124, https://openalex.org/W2293796414, https://openalex.org/W2766228646, https://openalex.org/W6604330103, https://openalex.org/W6784469945, https://openalex.org/W2943852008, https://openalex.org/W6756900602, https://openalex.org/W6750422162, https://openalex.org/W6758766419, https://openalex.org/W2600164692, https://openalex.org/W6780331948, https://openalex.org/W6779419766, https://openalex.org/W6733277040, https://openalex.org/W6782047440, https://openalex.org/W3107806454, https://openalex.org/W2910704120, https://openalex.org/W6764799667, https://openalex.org/W6677094818, https://openalex.org/W3006144347, https://openalex.org/W2885007481, https://openalex.org/W6654824075, https://openalex.org/W3013219028, https://openalex.org/W6761329363, https://openalex.org/W6789309352, https://openalex.org/W2794694510, https://openalex.org/W2560640725, https://openalex.org/W2976152462, https://openalex.org/W1967903162, https://openalex.org/W2997201843, https://openalex.org/W2066174791, https://openalex.org/W6601299523, https://openalex.org/W2290944024, https://openalex.org/W6604251292, https://openalex.org/W2902570809, https://openalex.org/W2914370086, https://openalex.org/W3212789951, https://openalex.org/W4239832341, https://openalex.org/W4255224382, https://openalex.org/W2494788155, https://openalex.org/W2197836422, https://openalex.org/W4300072878, https://openalex.org/W4236821258, https://openalex.org/W4245729972, https://openalex.org/W4289459463, https://openalex.org/W4254505264, https://openalex.org/W3194870418, https://openalex.org/W3149018775, https://openalex.org/W4237619172, https://openalex.org/W4236428812, https://openalex.org/W4255340499, https://openalex.org/W4229670006, https://openalex.org/W4234109393, https://openalex.org/W4239717097, https://openalex.org/W3083261337, https://openalex.org/W2953416325, https://openalex.org/W4238716517, https://openalex.org/W4255407237, https://openalex.org/W4205301942, https://openalex.org/W4254475551, https://openalex.org/W4246762826, https://openalex.org/W4229932489, https://openalex.org/W4241275930, https://openalex.org/W4248427106 |
| referenced_works_count | 97 |
| abstract_inverted_index.a | 47, 53, 87, 91, 100, 117, 140, 145 |
| abstract_inverted_index.To | 40 |
| abstract_inverted_index.as | 90, 99, 120 |
| abstract_inverted_index.by | 138 |
| abstract_inverted_index.in | 9, 144, 159, 170 |
| abstract_inverted_index.of | 2, 12, 17, 28, 86, 111, 132, 156, 163 |
| abstract_inverted_index.to | 19, 37, 105, 126 |
| abstract_inverted_index.we | 45, 115 |
| abstract_inverted_index.IoT | 29, 112, 149, 171 |
| abstract_inverted_index.Our | 64 |
| abstract_inverted_index.The | 0, 80, 130 |
| abstract_inverted_index.and | 21, 31, 59, 94 |
| abstract_inverted_index.for | 56 |
| abstract_inverted_index.has | 5 |
| abstract_inverted_index.our | 13, 157 |
| abstract_inverted_index.the | 25, 35, 42, 61, 84, 107, 133, 154, 161 |
| abstract_inverted_index.use | 85 |
| abstract_inverted_index.was | 136 |
| abstract_inverted_index.area | 110 |
| abstract_inverted_index.high | 167 |
| abstract_inverted_index.that | 51, 71 |
| abstract_inverted_index.with | 77 |
| abstract_inverted_index.(IoT) | 4 |
| abstract_inverted_index.based | 97 |
| abstract_inverted_index.cost. | 129 |
| abstract_inverted_index.cyber | 78 |
| abstract_inverted_index.decoy | 88 |
| abstract_inverted_index.known | 119 |
| abstract_inverted_index.model | 143 |
| abstract_inverted_index.nodes | 89 |
| abstract_inverted_index.using | 139 |
| abstract_inverted_index.while | 165 |
| abstract_inverted_index.Moving | 73 |
| abstract_inverted_index.System | 124 |
| abstract_inverted_index.Target | 74 |
| abstract_inverted_index.Things | 3 |
| abstract_inverted_index.attack | 108 |
| abstract_inverted_index.become | 6 |
| abstract_inverted_index.change | 106 |
| abstract_inverted_index.device | 32 |
| abstract_inverted_index.impact | 162 |
| abstract_inverted_index.levels | 169 |
| abstract_inverted_index.lives, | 14 |
| abstract_inverted_index.moving | 101 |
| abstract_inverted_index.nature | 27 |
| abstract_inverted_index.reduce | 127 |
| abstract_inverted_index.system | 96 |
| abstract_inverted_index.target | 102 |
| abstract_inverted_index.Defense | 75 |
| abstract_inverted_index.Defined | 147 |
| abstract_inverted_index.address | 41 |
| abstract_inverted_index.aspects | 11 |
| abstract_inverted_index.attacks | 164 |
| abstract_inverted_index.combine | 72 |
| abstract_inverted_index.connect | 20 |
| abstract_inverted_index.defense | 49, 62, 69, 103, 128, 134 |
| abstract_inverted_index.devices | 18, 36 |
| abstract_inverted_index.exposes | 34 |
| abstract_inverted_index.propose | 46 |
| abstract_inverted_index.results | 152 |
| abstract_inverted_index.surface | 109 |
| abstract_inverted_index.various | 10 |
| abstract_inverted_index.However, | 24 |
| abstract_inverted_index.Internet | 1 |
| abstract_inverted_index.Software | 146 |
| abstract_inverted_index.analysis | 58 |
| abstract_inverted_index.approach | 55, 66, 82, 158 |
| abstract_inverted_index.billions | 16 |
| abstract_inverted_index.enabling | 15 |
| abstract_inverted_index.involves | 83 |
| abstract_inverted_index.network. | 150 |
| abstract_inverted_index.proposed | 65, 81 |
| abstract_inverted_index.security | 38, 43, 57, 142 |
| abstract_inverted_index.strategy | 104 |
| abstract_inverted_index.threats. | 39 |
| abstract_inverted_index.Diversity | 125 |
| abstract_inverted_index.Important | 121 |
| abstract_inverted_index.Operating | 123 |
| abstract_inverted_index.deception | 92 |
| abstract_inverted_index.diversity | 98 |
| abstract_inverted_index.evaluated | 137 |
| abstract_inverted_index.framework | 50 |
| abstract_inverted_index.graphical | 141 |
| abstract_inverted_index.intricate | 26 |
| abstract_inverted_index.introduce | 116 |
| abstract_inverted_index.leverages | 52 |
| abstract_inverted_index.networks. | 113, 172 |
| abstract_inverted_index.operating | 95 |
| abstract_inverted_index.prevalent | 8 |
| abstract_inverted_index.proactive | 48, 68 |
| abstract_inverted_index.technique | 93, 118 |
| abstract_inverted_index.Simulation | 151 |
| abstract_inverted_index.deception. | 79 |
| abstract_inverted_index.mechanisms | 70, 135 |
| abstract_inverted_index.mitigating | 160 |
| abstract_inverted_index.techniques | 76 |
| abstract_inverted_index.challenges, | 44 |
| abstract_inverted_index.communicate | 22 |
| abstract_inverted_index.connections | 30 |
| abstract_inverted_index.demonstrate | 153 |
| abstract_inverted_index.facilitates | 60 |
| abstract_inverted_index.maintaining | 166 |
| abstract_inverted_index.model-based | 54 |
| abstract_inverted_index.performance | 168 |
| abstract_inverted_index.seamlessly. | 23 |
| abstract_inverted_index.strategies. | 63 |
| abstract_inverted_index.incorporates | 67 |
| abstract_inverted_index.increasingly | 7 |
| abstract_inverted_index.Additionally, | 114 |
| abstract_inverted_index.Measure-based | 122 |
| abstract_inverted_index.effectiveness | 131, 155 |
| abstract_inverted_index.vulnerabilities | 33 |
| abstract_inverted_index.Networking-based | 148 |
| cited_by_percentile_year.max | 100 |
| cited_by_percentile_year.min | 99 |
| corresponding_author_ids | https://openalex.org/A5101903526, https://openalex.org/A5054836950, https://openalex.org/A5030994788, https://openalex.org/A5003563704, https://openalex.org/A5057587489, https://openalex.org/A5005267734 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I185492890, https://openalex.org/I82951845 |
| citation_normalized_percentile.value | 0.99536484 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |