{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:31:38Z","timestamp":1743139898005,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030736026"},{"type":"electronic","value":"9783030736033"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73603-3_49","type":"book-chapter","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:04:19Z","timestamp":1617948259000},"page":"525-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Security Management Model for Critical Infrastructure and Improving the Security Level on Transferring Digital Data"],"prefix":"10.1007","author":[{"given":"Pradeep","family":"Bedi","sequence":"first","affiliation":[]},{"given":"S. B.","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Jugnesh","family":"Kumar","sequence":"additional","affiliation":[]},{"family":"Ritika","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"49_CR1","unstructured":"Byres, E., Lowe, J.: The myths and facts behind cyber security risks for industrial control systems. In: Proceedings in VDE Kongress, vol. 112, pp. 1\u20136 (2004)"},{"key":"49_CR2","first-page":"27","volume":"4","author":"SR Chabinsky","year":"2010","unstructured":"Chabinsky, S.R.: Cybersecurity strategy: a primer for policy makers and those on the front line. J. National Secur. Law Policy 4, 27\u201339 (2010)","journal-title":"J. National Secur. Law Policy"},{"key":"49_CR3","unstructured":"Defense Strategy for Operating in Cyberspace. US DoD, pp. 1\u201311 (2011)"},{"key":"49_CR4","unstructured":"The National Military Strategy for Cyberspace Operations, Chairman of the Joint Chiefs of Staff, Washington, D.C. (2006)"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Andress, J., Winterfeld, S.: Cyber Warfare: Techniques. Tactics and Tools for Security Practitioners. pp. 1\u2013277. Elsevier, Waltham (2011)","DOI":"10.1016\/B978-1-59749-637-7.00001-0"},{"key":"49_CR6","volume-title":"Global Commons Maritime Air Space Cyber","author":"M Barret","year":"2011","unstructured":"Barret, M., Bedford, D., Skinner, E., Vergles, E.: Global Commons Maritime Air Space Cyber. NATO, Norfolk (2011)"},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"1784","DOI":"10.3844\/jcssp.2011.1784.1792","volume":"7","author":"ARM Yusof","year":"2011","unstructured":"Yusof, A.R.M., Sukimi, M.F., Ismail, S.B., Othman, Z.B.: The cyber space and information, communication and technology: a tool for westernization or orientalism or both. J. Comput. Sci. 7, 1784\u20131792 (2011)","journal-title":"J. Comput. Sci."},{"key":"49_CR8","unstructured":"The United States Army\u2019s Cyberspace Operations Concept Capability Plan 2016\u20132028, US Army TRADOC Pamphlet 525-7-8, pp. 1\u201372 (2010)"},{"key":"49_CR9","unstructured":"Kim, S., Seo, S., Lee, I.: Essential characteristics of cyberspace and analysis of cyber educational institutions. In: Proceedings of the 3rd Asia-Pacific International Conference on Computational Methods in Engineering (ICOME2009), pp. 1\u20135 (2009)"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Reveron, D.S.: Cyberspace and national security: threats, opportunities, and power in a virtual world, vol. 34, no. 1, pp. 254\u2013256. Georgetown University Press, Washington (2012)","DOI":"10.1080\/13523260.2013.776801"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Gunjan, V.K., Kumar, A., Avdhanam, S.: A survey of cyber crime in India. In: 2013 15th IEEE International Conference on Advanced Computing Technologies (ICACT), pp. 1\u20136 (2013)","DOI":"10.1109\/ICACT.2013.6710503"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TDSC.2015.2502407","volume":"13","author":"W Mazurczyk","year":"2016","unstructured":"Mazurczyk, W., Holt, T., Szczypiorski, K.: Guest editors\u2019 introduction: special issue on cyber crime. IEEE Trans. Dependable Secure Comput. 13, 146\u2013147 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"49_CR13","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.1109\/ACCESS.2016.2544381","volume":"4","author":"R Ramirez","year":"2016","unstructured":"Ramirez, R., Choucri, N.: Improving interdisciplinary communication with standardized cyber security terminology: a literature review. IEEE Access. 4, 2216\u20132243 (2016)","journal-title":"IEEE Access."},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Gunjan, V.K., Kumar, A., Avdhanam, S.: A survey of cyber crime in India. In: 2013 15th IEEE International Conference on Advanced Computing Technologies (ICACT), pp. 1\u20136 (2019)","DOI":"10.1109\/ICACT.2013.6710503"},{"key":"49_CR15","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.clsr.2012.03.013","volume":"28","author":"R Jamieson","year":"2018","unstructured":"Jamieson, R., Land, L.P.W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., Sarre, R.: Addressing identity crime in crime management information systems: definitions classification, and empirics. Comput. Law Secur. Rev. 28, 381\u2013395 (2018)","journal-title":"Comput. Law Secur. Rev."},{"issue":"4","key":"49_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MMUL.2017.4031317","volume":"24","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Dai, W., Zhang, B., Ma, J., Vasilakos, A.V.: Word of mouth mobile crowd sourcing: increasing awareness of physical, cyber, and social interactions. IEEE Multimedia 24(4), 26\u201337 (2017)","journal-title":"IEEE Multimedia"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Rege, A., Obradovic, Z., Asadi, N., Singer, B., Masceri, N.: A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies. In: 2017 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), pp. 1\u20137 (2017)","DOI":"10.1109\/CyberSA.2017.8073398"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Stoughton, A., Varia, M.: Mechanizing the proof of adaptive information-theoretic security of cryptographic protocols in the random oracle model. In: 30th Computer Security Foundations Symposium (CSF), pp. 83\u201399. IEEE (2017)","DOI":"10.1109\/CSF.2017.36"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Wei, B., Liao, G., Li, W., Gong, Z.: A practical one-time file encryption protocol for IoT devices. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 2, pp. 114\u2013119 (2017)","DOI":"10.1109\/CSE-EUC.2017.206"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Ali, F.S., Lu, S.: Searchable encryption with conjunctive field free keyword search scheme. In: 2016 International Conference on Network and Information Systems for Computers (ICNISC), pp. 260\u2013264 (2016)","DOI":"10.1109\/ICNISC.2016.064"},{"key":"49_CR21","doi-asserted-by":"crossref","unstructured":"Evangelopoulou, M., Johnson, C.W.: Empirical framework for situation awareness measurement techniques in network defense. In: 2015 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20135 (2015)","DOI":"10.1109\/CyberSA.2015.7166132"},{"key":"49_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"RV Solms","year":"2013","unstructured":"Solms, R.V., Niekerk, J.V.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013)","journal-title":"Comput. Secur."},{"key":"49_CR23","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.sbspro.2013.10.333","volume":"103","author":"A Manuputty","year":"2013","unstructured":"Manuputty, A., Noor, S.M., Sumardi, J.: Cyber security: rule of use internet safely? Proc. Soc. Behav. Sci. 103, 255\u2013261 (2013)","journal-title":"Proc. Soc. Behav. Sci."},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Wu, L., Kaiser, G.: FARE: a framework for benchmarking reliability of cyber-physical systems. In: IEEE International Conferences on Applications and Technology Conference (LISAT), pp. 1\u20136 (2013)","DOI":"10.1109\/LISAT.2013.6578226"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73603-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:26:49Z","timestamp":1617949609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73603-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736026","9783030736033"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73603-3_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}