Modified graph-based algorithm to analyze security threats in IoT

In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...

Full description

Saved in:
Bibliographic Details
Published inPeerJ. Computer science Vol. 9; p. e1743
Main Authors Arat, Ferhat, Akleylek, Sedat
Format Journal Article
LanguageEnglish
Published United States PeerJ. Ltd 08.12.2023
PeerJ, Inc
PeerJ Inc
Subjects
Online AccessGet full text
ISSN2376-5992
2376-5992
DOI10.7717/peerj-cs.1743

Cover

Abstract In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
AbstractList In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
ArticleNumber e1743
Audience Academic
Author Akleylek, Sedat
Arat, Ferhat
Author_xml – sequence: 1
  givenname: Ferhat
  orcidid: 0000-0002-4347-0016
  surname: Arat
  fullname: Arat, Ferhat
  organization: Department of Software Engineering, Samsun University, Samsun, Turkey
– sequence: 2
  givenname: Sedat
  orcidid: 0000-0001-7005-6489
  surname: Akleylek
  fullname: Akleylek, Sedat
  organization: Department of Computer Engineering, Ondokuz Mayis University Samsun, Samsun, Turkey, University of Tartu, Tartu, Estonia, Cyber Security and Information Technologies Research and Development Centre, Ondokuz Mayis University Samsun, Samsun, Turkey
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38192462$$D View this record in MEDLINE/PubMed
BookMark eNqFkktv1DAUhSNUREvpki2KxAYWKX4kdrxCo4rHSEVIUNbWjXOd8SgTD3YCDL8eT6e0TSWEvbB1_Z1j-9hPs6PBD5hlzyk5l5LKN1vEsC5MPKey5I-yE8alKCql2NG9-XF2FuOaEEIrmpp6kh3zmipWCnaSLT751lmHbd4F2K6KBmKaQ9_54MbVJh99DgP0u9-YRzRTKu7ycRUQxpi7IV_6q2fZYwt9xLOb8TT79v7d1cXH4vLzh-XF4rIwFS_LojGkrgTnIHip2kbZRgrkFimXwC1v2opVYMracGGEaQiwmrSgahQtAQXIT7Plwbf1sNbb4DYQdtqD09cFHzoNYXSmR02FpVDVNJnZ0oi6rjhS0SKprQRJm-R1fvCahi3sfkLf3xpSovfR6utotYl6H20SvD0ItlOzwdbgMAboZ6eYrwxupTv_I9lJyRUTyeHVjUPw3yeMo964aLDvYUA_Rc0UZRVLe8mEvnyArv0U0iskqlaqooQLekd1kK7sBuvTxmZvqhc15apklJV3N51Rqbe4cSb9JutSfSZ4PRMkZsRfYwdTjHr59cucfXE_lds4_n6vBBQHwAQfY0D735j5A964EUbn96G6_h-qP1Gq8xg
CitedBy_id crossref_primary_10_1016_j_comnet_2025_111122
Cites_doi 10.1109/TII.2018.2808190
10.2478/amcs-2014-0016
10.1109/TDSC.2011.34
10.1155/2022/1401683
10.1016/j.cose.2021.102316
10.2139/ssrn.3603739
10.1109/MCOM.2017.1600528
10.1109/TII.2022.3152814
10.1109/COMST.2022.3158270
10.1016/j.jmsy.2020.10.011
10.1016/j.neucom.2021.07.101
10.1109/TII.2018.2832853
10.1016/j.comnet.2023.110046
10.1016/j.compind.2018.04.015
10.4018/978-1-7998-2466-4.ch038
10.1109/TII.2014.2300753
10.1016/j.csi.2017.09.006
10.1016/j.sintl.2021.100121
10.1016/j.scs.2020.102343
10.1109/ACCESS.2018.2863244
10.1109/ACCESS.2018.2805690
10.1016/j.cose.2023.103174
10.1016/j.adhoc.2021.102558
ContentType Journal Article
Copyright 2023 Arat and Akleylek.
COPYRIGHT 2023 PeerJ. Ltd.
2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 Arat and Akleylek 2023 Arat and Akleylek
Copyright_xml – notice: 2023 Arat and Akleylek.
– notice: COPYRIGHT 2023 PeerJ. Ltd.
– notice: 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 Arat and Akleylek 2023 Arat and Akleylek
DBID AAYXX
CITATION
NPM
ISR
3V.
7XB
8AL
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.7717/peerj-cs.1743
DatabaseName CrossRef
PubMed
Gale In Context: Science
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef

Publicly Available Content Database

PubMed
MEDLINE - Academic

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ : Directory of Open Access Journals [open access]
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2376-5992
ExternalDocumentID oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b
10.7717/peerj-cs.1743
PMC10773926
A813942124
38192462
10_7717_peerj_cs_1743
Genre Journal Article
GrantInformation_xml – fundername: ASELSAN A.Ş
GroupedDBID 53G
5VS
8FE
8FG
AAFWJ
AAYXX
ABUWG
ADBBV
AFKRA
AFPKN
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
FRP
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ICD
IEA
ISR
ITC
K6V
K7-
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
PUEGO
RPM
3V.
H13
M0N
NPM
7XB
8AL
8FK
JQ2
PKEHL
PQEST
PQUKI
Q9U
7X8
5PM
ADTOC
UNPAY
ID FETCH-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3
IEDL.DBID UNPAY
ISSN 2376-5992
IngestDate Fri Oct 03 12:52:31 EDT 2025
Sun Oct 26 03:44:30 EDT 2025
Tue Sep 30 17:10:46 EDT 2025
Thu Sep 04 16:01:34 EDT 2025
Sat Jul 26 00:09:16 EDT 2025
Mon Oct 20 22:47:43 EDT 2025
Mon Oct 20 16:54:20 EDT 2025
Thu Oct 16 15:50:43 EDT 2025
Thu Jan 02 22:29:51 EST 2025
Thu Apr 24 23:11:06 EDT 2025
Wed Oct 01 04:07:42 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Threats
Graph theory
Security
Industrial IoT
Risk assessment
Threat graph
Language English
License https://creativecommons.org/licenses/by/4.0
2023 Arat and Akleylek.
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-7005-6489
0000-0002-4347-0016
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.7717/peerj-cs.1743
PMID 38192462
PQID 2899510361
PQPubID 2045934
PageCount e1743
ParticipantIDs doaj_primary_oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b
unpaywall_primary_10_7717_peerj_cs_1743
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10773926
proquest_miscellaneous_2912527437
proquest_journals_2899510361
gale_infotracmisc_A813942124
gale_infotracacademiconefile_A813942124
gale_incontextgauss_ISR_A813942124
pubmed_primary_38192462
crossref_primary_10_7717_peerj_cs_1743
crossref_citationtrail_10_7717_peerj_cs_1743
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-12-08
PublicationDateYYYYMMDD 2023-12-08
PublicationDate_xml – month: 12
  year: 2023
  text: 2023-12-08
  day: 08
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: San Diego
– name: San Diego, USA
PublicationTitle PeerJ. Computer science
PublicationTitleAlternate PeerJ Comput Sci
PublicationYear 2023
Publisher PeerJ. Ltd
PeerJ, Inc
PeerJ Inc
Publisher_xml – name: PeerJ. Ltd
– name: PeerJ, Inc
– name: PeerJ Inc
References Polatidis (10.7717/peerj-cs.1743/ref-17) 2018; 56
Mouratidis (10.7717/peerj-cs.1743/ref-14) 2018b; 14
Mosteiro-Sanchez (10.7717/peerj-cs.1743/ref-12) 2020; 57
Stellios (10.7717/peerj-cs.1743/ref-22) 2021; 107
Jaidka (10.7717/peerj-cs.1743/ref-9) 2020
Qureshi (10.7717/peerj-cs.1743/ref-21) 2020; 61
Nguyen (10.7717/peerj-cs.1743/ref-16) 2022; 18
CVE (10.7717/peerj-cs.1743/ref-6) 2023
Javaid (10.7717/peerj-cs.1743/ref-10) 2021; 2
Mouratidis (10.7717/peerj-cs.1743/ref-13) 2018a; 14
Wang (10.7717/peerj-cs.1743/ref-26) 2018; 6
Sukiasyan (10.7717/peerj-cs.1743/ref-23) 2022; 484
Pretorius (10.7717/peerj-cs.1743/ref-19) 2020
Szwed (10.7717/peerj-cs.1743/ref-25) 2014; 24
Al-Turjman (10.7717/peerj-cs.1743/ref-1) 2018; 14
Jing (10.7717/peerj-cs.1743/ref-11) 2022; 2022
Da Xu (10.7717/peerj-cs.1743/ref-7) 2014; 10
Nandhini (10.7717/peerj-cs.1743/ref-15) 2019
Wu (10.7717/peerj-cs.1743/ref-27) 2022; 24
Arat (10.7717/peerj-cs.1743/ref-3) 2023b; 237
Boyes (10.7717/peerj-cs.1743/ref-4) 2018; 101
Arat (10.7717/peerj-cs.1743/ref-2) 2023a; 128
Prostov (10.7717/peerj-cs.1743/ref-20) 2021
Brewster (10.7717/peerj-cs.1743/ref-5) 2017; 55
Sun (10.7717/peerj-cs.1743/ref-24) 2021; 120
George (10.7717/peerj-cs.1743/ref-8) 2018; 6
Poolsappasit (10.7717/peerj-cs.1743/ref-18) 2012; 9
References_xml – start-page: 242
  year: 2019
  ident: 10.7717/peerj-cs.1743/ref-15
  article-title: Directed acyclic graph inherited attacks and mitigation methods in RPL: a review
– volume: 14
  start-page: 2736
  issue: 6
  year: 2018
  ident: 10.7717/peerj-cs.1743/ref-1
  article-title: Context-sensitive access in industrial internet of things (IIoT) healthcare applications
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2018.2808190
– volume: 24
  start-page: 213
  issue: 1
  year: 2014
  ident: 10.7717/peerj-cs.1743/ref-25
  article-title: A new lightweight method for security risk assessment based on fuzzy cognitive maps
  publication-title: International Journal of Applied Mathematics and Computer Science
  doi: 10.2478/amcs-2014-0016
– volume: 9
  start-page: 61
  issue: 1
  year: 2012
  ident: 10.7717/peerj-cs.1743/ref-18
  article-title: Dynamic security risk management using Bayesian attack graphs
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2011.34
– volume: 2022
  start-page: 1
  issue: 1–2
  year: 2022
  ident: 10.7717/peerj-cs.1743/ref-11
  article-title: Detection of DDoS attack within industrial IoT devices based on clustering and graph structure features
  publication-title: Security and Communication Networks
  doi: 10.1155/2022/1401683
– volume: 107
  start-page: 102316
  issue: 2
  year: 2021
  ident: 10.7717/peerj-cs.1743/ref-22
  article-title: Assessing IoT enabled cyber-physical attack paths against critical systems
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102316
– year: 2020
  ident: 10.7717/peerj-cs.1743/ref-9
  article-title: Evolution of IoT to IIoT: applications & challenges
  doi: 10.2139/ssrn.3603739
– volume: 55
  start-page: 26
  issue: 9
  year: 2017
  ident: 10.7717/peerj-cs.1743/ref-5
  article-title: IoT in agriculture: designing a Europe-wide large-scale pilot
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2017.1600528
– volume: 18
  start-page: 1
  issue: 11
  year: 2022
  ident: 10.7717/peerj-cs.1743/ref-16
  article-title: An advanced computing approach for IoT-botnet detection in industrial internet of things
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2022.3152814
– volume: 24
  start-page: 1175
  issue: 2
  year: 2022
  ident: 10.7717/peerj-cs.1743/ref-27
  article-title: A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory
  publication-title: IEEE Communications Surveys & Tutorials
  doi: 10.1109/COMST.2022.3158270
– volume: 57
  start-page: 367
  issue: 5
  year: 2020
  ident: 10.7717/peerj-cs.1743/ref-12
  article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0
  publication-title: Journal of Manufacturing Systems
  doi: 10.1016/j.jmsy.2020.10.011
– volume: 484
  start-page: 183
  issue: 4
  year: 2022
  ident: 10.7717/peerj-cs.1743/ref-23
  article-title: Secure data exchange in industrial internet of things
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2021.07.101
– volume: 14
  start-page: 4093
  issue: 9
  year: 2018b
  ident: 10.7717/peerj-cs.1743/ref-14
  article-title: A security analysis method for industrial internet of things
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2018.2832853
– volume: 237
  start-page: 110046
  year: 2023b
  ident: 10.7717/peerj-cs.1743/ref-3
  article-title: A new method for vulnerability and risk assessment of IoT
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2023.110046
– volume: 101
  start-page: 1
  issue: 8
  year: 2018
  ident: 10.7717/peerj-cs.1743/ref-4
  article-title: The industrial internet of things (IIoT): an analysis framework
  publication-title: Computers in Industry
  doi: 10.1016/j.compind.2018.04.015
– start-page: 613
  volume-title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
  year: 2020
  ident: 10.7717/peerj-cs.1743/ref-19
  article-title: Cyber-security for ICS/SCADA: a South African perspective
  doi: 10.4018/978-1-7998-2466-4.ch038
– start-page: 2394
  year: 2021
  ident: 10.7717/peerj-cs.1743/ref-20
  article-title: Construction and security analysis of private directed acyclic graph based systems for internet of things
– volume: 10
  start-page: 2233
  issue: 4
  year: 2014
  ident: 10.7717/peerj-cs.1743/ref-7
  article-title: Internet of things in industries: a survey
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2014.2300753
– volume: 14
  start-page: 4093
  issue: 9
  year: 2018a
  ident: 10.7717/peerj-cs.1743/ref-13
  article-title: A security analysis method for industrial internet of things
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2018.2832853
– volume: 56
  start-page: 74
  year: 2018
  ident: 10.7717/peerj-cs.1743/ref-17
  article-title: Cyber-attack path discovery in a dynamic supply chain maritime risk management system
  publication-title: Computer Standards & Interfaces
  doi: 10.1016/j.csi.2017.09.006
– volume: 2
  start-page: 100121
  issue: 12
  year: 2021
  ident: 10.7717/peerj-cs.1743/ref-10
  article-title: Sensors for daily life: a review
  publication-title: Sensors International
  doi: 10.1016/j.sintl.2021.100121
– volume: 61
  start-page: 102343
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.1743/ref-21
  article-title: A novel and secure attacks detection framework for smart cities industrial internet of things
  publication-title: Sustainable Cities and Society
  doi: 10.1016/j.scs.2020.102343
– volume: 6
  start-page: 43586
  year: 2018
  ident: 10.7717/peerj-cs.1743/ref-8
  article-title: A graph-based security framework for securing industrial IoT networks from vulnerability exploitations
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2863244
– volume: 6
  start-page: 8599
  year: 2018
  ident: 10.7717/peerj-cs.1743/ref-26
  article-title: A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2805690
– volume: 128
  start-page: 103174
  issue: 5
  year: 2023a
  ident: 10.7717/peerj-cs.1743/ref-2
  article-title: Attack path detection for IIoT enabled cyber physical systems: revisited
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2023.103174
– volume: 120
  start-page: 102558
  issue: 8
  year: 2021
  ident: 10.7717/peerj-cs.1743/ref-24
  article-title: Effective malware detection scheme based on classified behavior graph in IIoT
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2021.102558
– year: 2023
  ident: 10.7717/peerj-cs.1743/ref-6
  article-title: Common Vulnerabilities and Exposures
SSID ssj0001511119
Score 2.3243597
Snippet In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these...
SourceID doaj
unpaywall
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage e1743
SubjectTerms Algorithms
Algorithms and Analysis of Algorithms
Analysis
Control systems
Controllers
Cybersecurity
Embedded systems
Graph theory
Industrial applications
Industrial electronics
Industrial IoT
Information technology
Internet of Things
Interoperability
Manufacturing
Physical instruments
Risk assessment
Safety and security measures
Security
Security and Privacy
Security systems
Sensors
Technology application
Threat evaluation
Threat graph
Threats
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQL3Dh_QgUZBCCC1Gd2HGc44KoWiQ4QCv1ZvnZ3WpJVpusEPx6ZpLsagMCLlzjsWR_GXu-USbfEPKSscAsr2wqvQopMOI8NSrAubKlKjwkLNb2Vb6f5Mm5-HBRXOy1-sKasEEeeADuKJMxMwWEFcejcFJBeAmZ9IGpWJoys3j7MlXtJVPD_8F4FVSDqGYJKcvRKoT1VeparODhkyDUa_X_fiPvhaRfyyWvb-qV-f7NLJd7sej4Nrk5kkg6GxZ_h1wL9V1ya9uggY7n9R6ZfWz8IgLJpL0udYohy1OzvGzWi27-lXYNNShK8iPQduxjR7s50siWLmp62pzdJ-fH78_enaRjz4TUFVyI1DrgUJJzI7movK2iLWXgMWS8NDxy64u8ME4AmtJJZ5nJFfOmUkF6hkLd_AE5qJs6PCLU-OiZzyFBExDHGbiciDBZRNSoD2WWkDdbELUbBcWxr8VSQ2KBmOsec-1ajZgn5NXOfDUoafzJ8C2-kZ0RCmD3D8At9OgW-l9ukZAX-D41SlzUWENzaTZtq0-_fNYzBawXP4SLhLwejWIDK3dm_CUB9o-qWBPLw4klnEE3Hd66jR7vgFZjKot6hRKQer4bxplY11aHZgM2FRDMHDZdJuTh4GW7ffdadULmCVET_5sAMx2pF_NeIRxy-hKIr4QN7lz176A__h-gPyE3cuCAfbWPOiQH3XoTngJn6-yz_nj-BHz6QI0
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9NAEF6V9AAX3g9DQQYhuGDV9q7X6wNCKWrVIhGh0kq9rfblJCjYIXaE4Ncz46zTGkSv2bGUGc_jG3v8DSGv49jFmhY64la4CBBxGinhIK50LjILDYvW3ZTvhB-fs08X2cUOmfTfwuBYZZ8Tu0Rta4PPyPexMUD2N558WP6IcGsUvl3tV2gov1rBvu8oxm6Q3RSZsUZk9-Bw8uX08qlLhimi2JBt5tDK7C-dW32LTIOTPXRQnDoO_38z9ZVS9fcY5c11tVS_fqrF4kqNOrpLbntwGY433nCP7LjqPrnTL24IfRw_IOPPtZ2XAD7Djq86wlJmQ7WYgsLt7HvY1qFCspLfLmz8fruwnSG8bMJ5FZ7UZw_J-dHh2cfjyO9SiExGGYu0AWzFKVWcssLqotQ5d7R0Cc0VLam2WZopw4Sh3HCjY5WK2KpCOG5jJPCmj8ioqiv3hITKlja2KTRuDOp7DK7ISriYlchd7_IkIO96I0rjicZx38VCQsOBNpedzaVpJNo8IG-24ssNw8b_BA_wjmyFkBi7-6FeTaWPM5nwMlEZoBBDS2a4ADTiEm5dLMpc5YkOyCu8nxKpLyqcrZmqddPIk6-nciwADeMLchaQt16orOGfG-U_VQD9kS1rILk3kITYNMPj3m2kzw2NvPTkgLzcHuOVOO9WuXoNMgUAzxSUzgPyeONlW707DjvG04CIgf8NDDM8qeazjjkcev0cADEHBbeuer3Rn16vwTNyKwXU1833iD0yaldr9xxQWqtf-ND7AxCdPsg
  priority: 102
  providerName: ProQuest
Title Modified graph-based algorithm to analyze security threats in IoT
URI https://www.ncbi.nlm.nih.gov/pubmed/38192462
https://www.proquest.com/docview/2899510361
https://www.proquest.com/docview/2912527437
https://pubmed.ncbi.nlm.nih.gov/PMC10773926
https://doi.org/10.7717/peerj-cs.1743
https://doaj.org/article/16f1a5818c3f4c68853e16de08f7a71b
UnpaywallVersion publishedVersion
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ : Directory of Open Access Journals [open access]
  customDbUrl:
  eissn: 2376-5992
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001511119
  issn: 2376-5992
  databaseCode: DOA
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2376-5992
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001511119
  issn: 2376-5992
  databaseCode: M~E
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 2376-5992
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001511119
  issn: 2376-5992
  databaseCode: RPM
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: Proquest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2376-5992
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001511119
  issn: 2376-5992
  databaseCode: BENPR
  dateStart: 20150527
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2376-5992
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001511119
  issn: 2376-5992
  databaseCode: 8FG
  dateStart: 20150527
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEF7R5AAXyhtDiQxCcMHF9tq762OKGlokoqq0Ujmt9tkEgh3FjhD99cw6myhuxePqnZU84xnPN97xNwi9jmMTS1zIiGhmIkDEaSSYgbiSlOUaChYp2y7fMTk6zz5d5Be-icb9C7N1fk-h0ng_N2bxLVK1a7zBO6hPcoDcPdQ_H58Mv7aD4yiJ8qJIV_yZN_d08k1Ly3_z5buVfa53Rt5elnPx66eYzbbSzmgXjdY3vOo2-b6_bOS-urrG5fhPje6hux54hsOVp9xHt0z5AO2uhzqEPsYfouHnSk8tANOw5bKOXJrToZhdVotpM_kRNlUoHJHJlQlrP_subCYOetbhtAyPq7NH6Hx0ePbhKPJzFiKV4yyLpALcRTAWBGeFloWVlBhsTYKpwBZLnae5UBlTmCiiZCxSFmtRMEN07Mi98WPUK6vSPEWh0FbHOoWiLoPcH4ObZhY2Z9bx2huaBOjd-mlw5UnI3SyMGYdixJmHt-bhqubOPAF6sxGfr9g3_iR44B7tRsiRZrcXwPLcxyBPiE1EDghFYZspwgCpmIRoEzNLBU1kgF45x-COFqN0fTeXYlnX_PjLKR8yQMru8DwL0FsvZCu4cyX8bwygv2PS6kjudSQhblV3ee1_3L83au7KX8dxSMBSLzfLbqfrhStNtQSZAkBpCkrTAD1ZuetG75bfLiNpgFjHkTuG6a6U00nLKp7ElAJYJqDgxuf_bvRn_y35HN1JARy2bUBsD_WaxdK8ADDXyAHaYaOPA9Q_OByfnA7aTyIDH96_AUhnTS0
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELfG9jBe-P4IDDCIjxeiJbHjJA8T6mBTy7YKjU7am3Fspy0qSWlaTeOP42_jLk26BcTe9lqfo_p8d_5dcv4dIa89z3opS1JXmNi6gIgDV8UW_CqN4tBAwpKmVZVvX3RP-OfT8HSN_G7uwmBZZRMTq0BtCo3vyLcxMUD2N-F_mP50sWsUfl1tWmiourWC2akoxuqLHQf2_AxSuHKn9wn2-00Q7O8NPnbdusuAq0PGuZtqQB2CMSUYT0yaZGkkLMuszyLFMpaaMAiV5rFmQgudeiqIPaOS2ArjIbU1g-feIBscZkPyt7G71_9yfPGWJ8SQlCzJPSNInban1s6-u7rESiLWOgyrngH_ngyXjsa_yzY3F_lUnZ-pyeTSmbh_h9yqwSztLK3vLlmz-T1yu2kUQeu4cZ90jgozzgDs0oof28Wj01A1GYKC56MfdF5QheQovywt6356dD5COFvScU57xeABObkWrT4k63mR28eEKpMZzwSQKHLAEx6YPs9gMs-QK99GvkPeN0qUuiY2x_4aEwkJDupcVjqXupSoc4e8XYlPl4we_xPcxR1ZCSERd_VDMRvK2q-lLzJfhYB6NMu4FjGgH-sLY704i1Tkpw55hfspkWojx1qeoVqUpex9PZadGNA3fpDnDnlXC2UF_HOt6qsRsH5k52pJbrUkIRbo9nBjNrKORaW88ByHvFwN40ysr8ttsQCZBIBuAIuOHPJoaWWrdVeceVwEDolb9tdSTHskH48qpnLfiyIA4AIWuDLVq5X-5OoVvCCb3cHRoTzs9Q-ekpsBIM6qtijeIuvz2cI-A4Q4T5_XbkjJt-v2_D_XeHx8
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6VIgEX3g9DgQXxuGDF9tpr-4BQoYSGQoVoK_W27DMJCnaIE1Xlp_HrmHHstAbRW6_eseWdnZn9xp79hpBnQWADxXLlc5NZHxBx5MvMgl-pNEsMJCxK1VW-u3z7IP54mByukd_tWRgsq2xjYh2oTanxG3kPEwNkf-NhzzVlEV-2-m-mP33sIIV_Wtt2GksT2bHHR5C-Va8HW7DWz6Oo_37_3bbfdBjwdcLi2FcaEAdnTHIW50blTqXcMmdDlkrmmDJJlEgdZ5pxzbUKZJQFRuaZ5SZAWmsGz71ALqbI4o6n1PsfTr7vJBiM8iWtZwpJU29q7ey7ryusIWKdbbDuFvDvnnBqU_y7YPPyopjK4yM5mZzaDfvXydUGxtLNpd3dIGu2uEmutS0iaBMxbpHNz6UZO4C5tGbG9nHTNFROhqDO-egHnZdUIi3KL0urppMenY8QyFZ0XNBBuX-bHJyLTu-Q9aIs7D1CpXEmMBGkiDEgiQCMPnZwc-yQJd-moUdetUoUuqE0x84aEwGpDepc1DoXuhKoc4-8WIlPl1we_xN8iyuyEkIK7vpCORuKxqNFyF0oE8A7mrlY8wxwjw25sUHmUpmGyiNPcT0FkmwUaK5DuagqMdj7KjYzwN34Kz72yMtGyJXw5lo2hyJg_sjL1ZHc6EhCFNDd4dZsRBOFKnHiMx55shrGO7GyrrDlAmRygLgRTDr1yN2lla3mXbPlxTzySNaxv45iuiPFeFRzlIdBmgL05jDBlamerfT7Z8_gMbkE_i4-DXZ3HpArEUDNuqgo2yDr89nCPgRoOFePah-k5Nt5O_0fgF16Fg
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELege4AXxjeBgQxC8EK2JHYc57Egqg2JCcEqjSfLn2tZl1RNKsT-es6pWzWb-HiNz5Lvcuf7nXL5HUKvk8QmipQqZobbGBBxFktuIa5UwXMDBYtSXZfvMTsc00-n-WloovH_wmx9vy-g0jiYW7v4EevGN96Qm2iH5QC5B2hnfPxl-L0bHFewOC_LbMWfeX1PL990tPzXL9-t7HO1M_LWsprLXz_lbLaVdka7aLQ-8Krb5Hx_2ap9fXmFy_GfGt1FdwLwxMOVp9xDN2x1H-2uhzrgEOMP0PBzbaYOgCnuuKxjn-YMlrOzejFtJxe4rbH0RCaXFjdh9h1uJx56Nnha4aP65CEajz6efDiMw5yFWOeE0lhpwF2MEMkILY0qnSqYJc6mpJDEEWXyLJeack2YZlolMuOJkSW3zCSe3Js8QoOqruwThKVxJjEZFHUUcn8CbkodbKbO89rbIo3Qu_XbEDqQkPtZGDMBxYg3j-jMI3QjvHki9GYjPl-xb_xJ8L1_tRshT5rdPQDLixCDImUulTkgFE0c1YwDUrEpMzbhrpBFqiL0yjuG8LQYle-7OZPLphFH376KIQek7D-e0wi9DUKuhpNrGX5jAP09k1ZPcq8nCXGr-8tr_xPh3miEL389xyEDS73cLPudvheusvUSZEoApRkoXUTo8cpdN3p3_HaUZRHiPUfuGaa_Uk0nHat4mhQFgGUGCm58_u9Gf_rfks_Q7QzAYdcGxPfQoF0s7XMAc616EUL5N2unSbg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Modified+graph-based+algorithm+to+analyze+security+threats+in+IoT&rft.jtitle=PeerJ.+Computer+science&rft.au=Arat%2C+Ferhat&rft.au=Akleylek%2C+Sedat&rft.date=2023-12-08&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=9&rft.spage=e1743&rft_id=info:doi/10.7717%2Fpeerj-cs.1743&rft.externalDBID=n%2Fa&rft.externalDocID=10_7717_peerj_cs_1743
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon