{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T19:58:10Z","timestamp":1772308690226,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030519704","type":"print"},{"value":"9783030519711","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_42","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"509-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["The Impact of the Advanced Technologies over the Cyber Attacks Surface"],"prefix":"10.1007","author":[{"given":"Willian","family":"Dimitrov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"issue":"1","key":"42_CR1","doi-asserted-by":"publisher","first-page":"tyy006","DOI":"10.1093\/cybsec\/tyy006","volume":"4","author":"I Agrafiotis","year":"2018","unstructured":"Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), tyy006 (2018)","journal-title":"J. Cybersecur."},{"key":"42_CR2","first-page":"012006","volume":"1018","author":"QK Kadhim","year":"2018","unstructured":"Kadhim, Q.K., Yusof, R., Mahdi, H.S., Al-shami, S.S.A., Selamat, S.R.: A review study on cloud computing issues. J. Phys: Conf. Ser. 1018, 012006 (2018)","journal-title":"J. Phys: Conf. Ser."},{"issue":"1","key":"42_CR3","first-page":"30","volume":"3","author":"A Bisong","year":"2011","unstructured":"Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30\u201345 (2011)","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Noyes, D., Liu, H., Fortier, P.: Security analysis and improvement of USB technology. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST). IEEE, May 2016","DOI":"10.1109\/THS.2016.7568955"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Prasad, R., Rohokale, V.: Mobile device cyber security. In: Springer Series in Wireless Technology. Springer International Publishing, pp. 217\u2013229 (2019)","DOI":"10.1007\/978-3-030-31703-4_15"},{"issue":"3","key":"42_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2019\/v12i3\/139557","volume":"12","author":"NM Almutairy","year":"2019","unstructured":"Almutairy, N.M., Al-Shqeerat, K.H.A., Hamad, H.A.A.: A taxonomy of virtualization security issues in cloud computing environments. Indian J. Sci. Technol. 12(3), 1\u201319 (2019)","journal-title":"Indian J. Sci. Technol."},{"key":"42_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.infsof.2018.07.008","volume":"104","author":"C Theisen","year":"2018","unstructured":"Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J.C., Meneely, A., Williams, L.: Attack surface definitions: a systematic literature review. Inf. Softw. Technol. 104, 94\u2013103 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"42_CR8","unstructured":"Attack surface, February 2019. https:\/\/whatis.techtarget.com\/definition\/attack-surface"},{"key":"42_CR9","unstructured":"Tripware: Unbalanced Security is Increasing Your Attack Surface The State of Security, March 2014. https:\/\/www.tripwire.com\/state-of-security\/featured\/unbalanced-security-increasing-attack-surface-2"},{"key":"42_CR10","unstructured":"Friedman, J.: Attack your attack surface. How to reduce your exposure to cyberattacks with an attack surface visualization solution, Whitepapper, Skybox security (2016)"},{"key":"42_CR11","unstructured":"CISOMAG: Cybercriminals use Google Calendar alerts to steal sensitive information, June 2019. https:\/\/www.cisomag.com\/cybercriminals-use-google-calendar-alerts-to-steal-sensitive-information"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Shaik, A., Borgaonkar, R., Park, S., Seifert, J.-P.: On the impact of rogue base stations in 4g\/LTE self organizing networks. In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2018. ACM Press (2018)","DOI":"10.1145\/3212480.3212497"},{"key":"42_CR13","unstructured":"Sophos: Security weaknesses in 5G, 4G and 3G could expose users\u2019 locations, February 2019. https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/security-weaknesses-in-5g-4g-and-3g-could-expose-users-locations"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Chlosta, M., Rupprecht, D., Holz, T., P\u00f6pper, C.: LTE security disabled. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019. ACM Press (2019)","DOI":"10.1145\/3317549.3324927"},{"key":"42_CR15","unstructured":"5G Mobile Technology Poses An Espionage Risk, March 2019. https:\/\/www.cybersecurityintelligence.com\/blog\/5g-mobile-technology-poses-an-espionage-risk-4005.html"},{"key":"42_CR16","unstructured":"Kemp, R.: Legal aspects of big data: part I legal rights in data. http:\/\/www.kempitlaw.com\/p97"},{"key":"42_CR17","unstructured":"Harris, B., Chin, D., Watson, G.: DOE\/DHS\/DOT volpe technical meeting on electric vehicle and charging station cybersecurity report. DOT-VNTSC-DOE-18-01, Kevin Harnett (2018)"},{"key":"42_CR18","unstructured":"Michael Bruemmer, E.M.B.: Why AI raises your risk of cybercrime and what to do about it, November 2018. https:\/\/www.cisoforum.com\/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it"},{"key":"42_CR19","unstructured":"Zheng, C.: The cybersecurity vulnerabilities to artificial intelligence, June 2019. https:\/\/www.cfr.org\/blog\/cybersecurity-vulnerabilities-artificial-intelligence"},{"key":"42_CR20","unstructured":"Giles, M.: AI for cybersecurity is a hot new thing\u2013and a dangerous gamble. MIT Technol. Rev. (2018)"},{"key":"42_CR21","unstructured":"Faggella, D.: Artificial intelligence and security: current applications and tomorrow\u2019s potentials. https:\/\/emerj.com\/ai-sector-overviews\/artificial-intelligence-and-security-applications"},{"key":"42_CR22","unstructured":"Kumar, M.: Cryptocurrency firm loses 145 million after CEO dies with only password, February 2019. https:\/\/thehackernews.com\/-2019\/02\/cryptocurrency-exchange-exit-scam.html"},{"key":"42_CR23","unstructured":"Kumar, M.: New mac malware targets cookies to steal from cryptocurrency wallets, October 2019. https:\/\/thehackernews.com\/2019\/02\/mac-malware-cryptocurrency.htm"},{"key":"42_CR24","unstructured":"Digital Shadows, The New Gold Rush: Cryptocurrencies are the New Frontier of Fraud (2018)"},{"key":"42_CR25","unstructured":"Khandelwal, S.: First hacker convicted of \u2018SIM swapping\u2019 attack gets 10 years in prison, 04 February 2019. https:\/\/thehackernews.com\/2019\/02\/sim-swapping-hack.html"},{"key":"42_CR26","unstructured":"Bradbury, D.: Blockchain hustler beats the house with smart contract hack, September 2018. https:\/\/nakedsecurity.sophos.com\/2018\/09\/14\/-blockchain-hustler-beats-the-house-with-smart-contract-hack"},{"key":"42_CR27","unstructured":"Armerding, T.: 300m deleted! How a tiny bug flushed away a fortune, November 2017. https:\/\/nakedsecurity.sophos.com\/2017\/11\/09\/300m-deleted-how-a-tiny-bug-flushed-away-a-fortune"},{"key":"42_CR28","unstructured":"Leyden, J.: Someone checked and, yup, you can still hijack Gmail, Bitcoin wallets etc via dirty SS7 tricks, January 2018. https:\/\/www.theregister.co.uk\/2017\/09\/18\/ss7-vuln-bitcoin-wallet-hack-risk"},{"key":"42_CR29","unstructured":"Cox, J.: You can spy like the NSA for a few thousand bucks, March 2018. https:\/\/www.thedailybeast.com\/you-can-spy-like-the-nsa-for-a-few-thousand-bucks"},{"key":"42_CR30","unstructured":"Prvulovic, M.: Hypothetical blockchain security vulnerabilities and how they can be addressed, June 2018. https:\/\/kapitalized.com\/blog\/hypothetical-blockchain-security-vulnerabilities-and-how-they-can-be"},{"key":"42_CR31","unstructured":"Praitheeshan, P., Pan, L., Yu, J., Liu, J., Doss, R.: Security analysis methods on ethereum smart contract vulnerabilities: a survey (2019)"},{"key":"42_CR32","doi-asserted-by":"crossref","unstructured":"Yarramreddy, A., Gromkowski, P., Baggili, I.: Forensic analysis of immersive virtual reality social applications: a primary account. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, May 2018","DOI":"10.1109\/SPW.2018.00034"},{"issue":"4","key":"42_CR33","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/2580723.2580730","volume":"57","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88\u201396 (2014)","journal-title":"Commun. ACM"},{"key":"42_CR34","unstructured":"McKie, R.: Virtual reality headsets could put childrens health at risk (2017)"},{"key":"42_CR35","unstructured":"Wong, J.C.: Sexual harassment in virtual reality feels all too real \u201cit\u2019s creepy beyond creepy\u201d, October 2016. https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/virtual-reality-sexual-harassment-online-groping-quivr"},{"key":"42_CR36","unstructured":"Buchleitner, J.: When virtual reality feels real, so does the sexual harassment, 5 April. https:\/\/www.revealnews.org\/article\/when-virtual-reality-feels-real-so-does-the-sexual-harassment"},{"key":"42_CR37","doi-asserted-by":"crossref","unstructured":"McPherson, R., Jana, S., Shmatikov, V.: No escape from reality. In: Proceedings of the 24th International Conference on World Wide Web - WWW 2015. ACM Press (2015)","DOI":"10.1145\/2736277.2741657"},{"key":"42_CR38","unstructured":"Hackers Use Ultrasonic Waves To Disrupt VR Headsets - VRScout, July 2017. https:\/\/vrscout.com\/news\/hackers-ultrasonic-waves-disrupt-vr-headset"},{"key":"42_CR39","unstructured":"Fineman, B., Lewis, N.: Securing your reality: addressing security and privacy in virtual and augmented reality applications, January 2019. https:\/\/er.educause.edu\/articles\/2018\/5\/securing-your-reality-addressing-security-and-privacy-in-virtual"},{"key":"42_CR40","unstructured":"T. S. Responce. ISTR 24: Symantec\u2019s Annual Threat Report Reveals More Ambitious and Destructive Attacks, September 2019"},{"issue":"3","key":"42_CR41","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1386\/tear.11.3.277_1","volume":"11","author":"D de Kerckhove","year":"2013","unstructured":"de Kerckhove, D., de Almeida, C.M.: What is a digital persona? Tech. Arts 11(3), 277\u2013287 (2013)","journal-title":"Tech. Arts"},{"key":"42_CR42","unstructured":"Cyber Security Review: Attack Uses Docker Containers To Hide, Persist, Plant Malware Cyber Security Review, February 2019. https:\/\/www.csiac.org\/digest-article\/attack-uses-docker-containers-to-hide-persist-plant-malware\/"},{"key":"42_CR43","doi-asserted-by":"crossref","unstructured":"Chelladhurai, J., Chelliah, P.R., Kumar, S.A.: Securing docker containers from denial of service (DoS) attacks. In: 2016 IEEE International Conference on Services Computing (SCC). IEEE, June 2016","DOI":"10.1109\/SCC.2016.123"},{"key":"42_CR44","unstructured":"Bettini, A.: Container security: the foundation of true cybersecurity, February 2019. https:\/\/www.itproportal.com\/features\/container-security-the-foundation-of-true-cybersecurity"},{"key":"42_CR45","unstructured":"Fortinet, SD-WAN in the age of digital transformation achieving business agility without complicating network security, December 2018"},{"key":"42_CR46","unstructured":"Malley, E.O.: Driving the Convergence of Networking and Security, 3 May 2018. https:\/\/www.securityweek.com\/driving-convergence-networking-and-security"},{"key":"42_CR47","unstructured":"Garson, S.: Warning: security vulnerabilities found in SD-WAN appliances, November 2017. https:\/\/www.networkworld.com\/article\/3238725\/warning-security-vulnerabilities-found-in-sd-wan-appliances.html"},{"key":"42_CR48","unstructured":"T. B. 1901, Tripwire state of container security report, January 2019"},{"key":"42_CR49","unstructured":"Zurkus, K.: Cyber-criminals work around road blocks, June 2018. https:\/\/www.infosecurity-magazine.com\/news\/cybercriminals-work-around-road"},{"key":"42_CR50","unstructured":"Kavanagh, C.: New Tech, new threats, and new governance challenges: an opportunity to craft smarter responses? Working Papper, Carnegie Endowment for International Peace, June 2019"},{"key":"42_CR51","unstructured":"Decentralized Application Security Project, DASP - TOP 10, November 2018. https:\/\/dasp.co"}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T19:34:25Z","timestamp":1618256065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}