{"created":"2023-06-20T15:14:18.240530+00:00","id":11429,"links":{},"metadata":{"_buckets":{"deposit":"1bbd8693-6e80-469b-a638-9a05538d97fd"},"_deposit":{"created_by":17,"id":"11429","owners":[17],"pid":{"revision_id":0,"type":"depid","value":"11429"},"status":"published"},"_oai":{"id":"oai:ynu.repo.nii.ac.jp:00011429","sets":["500:503"]},"author_link":["40459","40458"],"item_7_alternative_title_21":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"資源制約のあるIoT機器におけるサイバー脅威への対策:攻撃の観測とステルスセキュリティ"}]},"item_7_biblio_info_8":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2021-09-17","bibliographicIssueDateType":"Issued"}}]},"item_7_date_granted_66":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2021-09-17"}]},"item_7_degree_grantor_64":{"attribute_name":"学位授与機関","attribute_value_mlt":[{"subitem_degreegrantor":[{"subitem_degreegrantor_name":"横浜国立大学"}],"subitem_degreegrantor_identifier":[{"subitem_degreegrantor_identifier_name":"12701","subitem_degreegrantor_identifier_scheme":"kakenhi"}]}]},"item_7_degree_name_63":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"博士(情報学)"}]},"item_7_dissertation_number_67":{"attribute_name":"学位授与番号","attribute_value_mlt":[{"subitem_dissertationnumber":"甲第2252号"}]},"item_7_full_name_2":{"attribute_name":"著者(ヨミ)","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"40459","nameIdentifierScheme":"WEKO"}],"names":[{"name":"アミル, フセイン ボハリ"}]}]},"item_7_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.18880/00014088","subitem_identifier_reg_type":"JaLC"}]},"item_7_subject_24":{"attribute_name":"国立国会図書館分類","attribute_value_mlt":[{"subitem_subject":"UT51","subitem_subject_scheme":"NDLC"}]},"item_7_text_4":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University "}]},"item_7_text_65":{"attribute_name":"学位授与年度","attribute_value_mlt":[{"subitem_text_value":"2021年度"}]},"item_7_version_type_18":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Aamir, Hussain Bokhari","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"40458","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-11-16"}],"displaytype":"detail","filename":"aamir_hussain_bokhari-review.pdf","filesize":[{"value":"269.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"aamir_hussain_bokhari-review.pdf","url":"https://ynu.repo.nii.ac.jp/record/11429/files/aamir_hussain_bokhari-review.pdf"},"version_id":"6ec0f732-5eb8-48c1-a321-cdc3c6d6e31b"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-11-16"}],"displaytype":"detail","filename":"aamir_hussain_bokhari-thesis.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"aamir_hussain_bokhari-thesis.pdf","objectType":"fulltext","url":"https://ynu.repo.nii.ac.jp/record/11429/files/aamir_hussain_bokhari-thesis.pdf"},"version_id":"6bc8a4bc-6e63-43a4-a0d6-fc9f7aaccc54"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"doctoral thesis","resourceuri":"http://purl.org/coar/resource_type/c_db06"}]},"item_title":"Combating Cyber Threats on Resource-Constrained IoT Devices: Attack Observations and Stealth Security","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Combating Cyber Threats on Resource-Constrained IoT Devices: Attack Observations and Stealth Security","subitem_title_language":"en"}]},"item_type_id":"7","owner":"17","path":["503"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2021-11-16"},"publish_date":"2021-11-16","publish_status":"0","recid":"11429","relation_version_is_last":true,"title":["Combating Cyber Threats on Resource-Constrained IoT Devices: Attack Observations and Stealth Security"],"weko_creator_id":"17","weko_shared_id":-1},"updated":"2024-04-15T02:44:22.978677+00:00"}