{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:15:08Z","timestamp":1743030908231,"version":"3.40.3"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031622809"},{"type":"electronic","value":"9783031622816"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62281-6_36","type":"book-chapter","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T23:04:58Z","timestamp":1718319898000},"page":"523-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bibliometric and Visualized Analysis of Scientific Publications on Blockchain Technology in Cybersecurity"],"prefix":"10.1007","author":[{"given":"Isaac Atta Senior","family":"Ampofo","sequence":"first","affiliation":[]},{"given":"Emil Anthony","family":"Kobina Jnr","sequence":"additional","affiliation":[]},{"given":"Eugene Louis Batie","family":"Badzongoly","sequence":"additional","affiliation":[]},{"given":"Samuel Mensah","family":"Buabeng","sequence":"additional","affiliation":[]},{"given":"Francis","family":"Oppong-Twum","sequence":"additional","affiliation":[]},{"given":"Prince Kenneth","family":"Amoah","sequence":"additional","affiliation":[]},{"given":"Isaac Atta Junior","family":"Ampofo","sequence":"additional","affiliation":[]},{"given":"Gifty","family":"Afriyie","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Obiribea","sequence":"additional","affiliation":[]},{"given":"Mary Magdalene Linda","family":"Yeboah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Jung, J., Ryoo, J., Yi, Y., Kim, S.M.: Gateway over the air: towards pervasive internet connectivity for commodity IoT. In: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services, pp. 54\u201366 (2020)","DOI":"10.1145\/3386901.3388949"},{"issue":"2","key":"36_CR2","doi-asserted-by":"publisher","first-page":"e2060","DOI":"10.1002\/nem.2060","volume":"29","author":"H Hasanova","year":"2019","unstructured":"Hasanova, H., Baek, U.J., Shin, M.G., Cho, K., Kim, M.S.: A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Int. J. Network Manage. 29(2), e2060 (2019)","journal-title":"Int. J. Network Manage"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., Amaba, B.: Blockchain technology innovations. In: 2017 IEEE Technology & Engineering Management Conference (TEMSCON), pp. 137\u2013141. IEEE (2017)","DOI":"10.1109\/TEMSCON.2017.7998367"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Xu, C., Zhou, Z., Yang, S., Sun, L.: A survey of blockchain-based cybersecurity for vehicular networks. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 740\u2013745 (2020)","DOI":"10.1109\/IWCMC48107.2020.9148566"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Giannoutakis, K.M., et al.: A blockchain solution for enhancing cybersecurity defence of IoT. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 490\u2013495. IEEE (2020)","DOI":"10.1109\/Blockchain50366.2020.00071"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Vance, T.R., Vance, A.: Cybersecurity in the blockchain era: a survey on examining critical infrastructure protection with blockchain-based technology. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 107\u2013112. IEEE (2019)","DOI":"10.1109\/PICST47496.2019.9061242"},{"issue":"2","key":"36_CR7","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/RITA.2022.3166857","volume":"17","author":"YIL Lucio","year":"2022","unstructured":"Lucio, Y.I.L., Villalba, K.M., Donado, S.A.: Adaptive blockchain technology for a cybersecurity framework in IIoT. IEEE Revista Iberoamericana de Tecnologias del Aprendizaje 17(2), 178\u2013184 (2022)","journal-title":"IEEE Revista Iberoamericana de Tecnologias del Aprendizaje"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Bansal, P., Panchal, R., Bassi, S., Kumar, A.: Blockchain for cybersecurity: a comprehensive survey. In: 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 260\u2013265. IEEE (2020)","DOI":"10.1109\/CSNT48778.2020.9115738"},{"issue":"1","key":"36_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TII.2020.2998479","volume":"17","author":"P Zhuang","year":"2020","unstructured":"Zhuang, P., Zamir, T., Liang, H.: Blockchain for cybersecurity in smart grid: a comprehensive survey. IEEE Trans. Industr. Inf. 17(1), 3\u201319 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1353\/gia.2018.0005","volume":"19","author":"C Catalini","year":"2018","unstructured":"Catalini, C.: Blockchain technology and cryptocurrencies: implications for the digital economy, cybersecurity, and government. Georgetown J. Int. Aff. 19, 36\u201342 (2018)","journal-title":"Georgetown J. Int. Aff."},{"key":"36_CR11","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-981-13-8775-3_5","volume-title":"Advanced Applications of Blockchain Technology","author":"P Asuquo","year":"2020","unstructured":"Asuquo, P., Ogah, C., Hathal, W., Bao, S.: Blockchain meets cybersecurity: security, privacy, challenges, and opportunity. In: Kim, S., Deka, G.C. (eds.) Advanced Applications of Blockchain Technology. SBD, vol. 60, pp. 115\u2013127. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-8775-3_5"},{"issue":"1","key":"36_CR12","first-page":"184","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma, P.K., Moon, S.Y., Park, J.H.: Block-VN: a distributed blockchain based vehicular network architecture in smart City. JIPS 13(1), 184\u2013195 (2017)","journal-title":"JIPS"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Ossamah, A.: Blockchain as a solution to drone cybersecurity. In: 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), June, pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/WF-IoT48130.2020.9221466"},{"issue":"1","key":"36_CR14","first-page":"100001","volume":"1","author":"A Mittal","year":"2021","unstructured":"Mittal, A., Gupta, M.P., Chaturvedi, M., Chansarkar, S.R., Gupta, S.: Cybersecurity enhancement through blockchain training (CEBT)\u2013a serious game approach. Int. J. Inf. Manag. Data Insights 1(1), 100001 (2021)","journal-title":"Int. J. Inf. Manag. Data Insights"},{"key":"36_CR15","unstructured":"Nasdaq.com: How Blockchain Can Fight Fraud Based on Know-Your-Customer Data (2019). https:\/\/www.nasdaq.com\/articles\/how-blockchain-can-fight-fraud-based-know-your-customer-data-2019-02-11"},{"issue":"2","key":"36_CR16","first-page":"189","volume":"7","author":"S Demirkan","year":"2020","unstructured":"Demirkan, S., Demirkan, I., McKee, A.: Blockchain technology in the future of business cyber security and accounting. J. Manag. Anal. 7(2), 189\u2013208 (2020)","journal-title":"J. Manag. Anal."},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Dai, F., Shi, Y., Meng, N., Wei, L., Ye, Z.: From Bitcoin to cybersecurity: a comparative study of blockchain application and security issues. In: 2017 4th International Conference on Systems and Informatics (ICSAI), November, pp. 975\u2013979. IEEE (2017)","DOI":"10.1109\/ICSAI.2017.8248427"},{"issue":"6","key":"36_CR18","first-page":"833","volume":"46","author":"KJ Smith","year":"2019","unstructured":"Smith, K.J., Dhillon, G.: Assessing blockchain potential for improving the cybersecurity of financial transactions. Manag. Financ. 46(6), 833\u2013848 (2019)","journal-title":"Manag. Financ."},{"key":"36_CR19","unstructured":"Ferguson, A.: Closing the gaps: cybersecurity for U.S. forces and commands (2017). https:\/\/apps.dtic.mil\/docs\/citations\/AD1032663"},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","volume":"133","author":"N Donthu","year":"2021","unstructured":"Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: an overview and guidelines. J. Bus. Res. 133, 285\u2013296 (2021)","journal-title":"J. Bus. Res."},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Romanelli, J.P., Gon\u00e7alves, M.C.P., de Abreu Pestana, L.F., Soares, J.A.H., Boschi, R.S., Andrade, D.F.: Four challenges when conducting bibliometric reviews and how to deal with them. Environ. Sci. Pollut. Res. 1\u201311 (2021)","DOI":"10.1007\/s11356-021-16420-x"},{"key":"36_CR22","unstructured":"Van Eck, N.J., Waltman, L.: VOSviewer manual. Manual for VOSviewer version, vol. 1 (2011)"},{"issue":"2","key":"36_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/07317131.2018.1425352","volume":"35","author":"D Wong","year":"2018","unstructured":"Wong, D.: VOSviewer. Tech. Serv. Q. 35(2), 219\u2013220 (2018)","journal-title":"Tech. Serv. Q."},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Mora, O.B., Rivera, R., Larios, V.M., Beltr\u00e1n-Ram\u00edrez, J.R., Maciel, R., Ochoa, A.: A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In: 2018 IEEE International Smart Cities Conference (ISC2), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/ISC2.2018.8656694"},{"issue":"1","key":"36_CR25","first-page":"3649","volume":"25","author":"D Kathuria","year":"2021","unstructured":"Kathuria, D.: A bibliometric analysis and visualisation of research trends in leadless pacemaker. Ann. Rom. Soc. Cell Biol. 25(1), 3649\u20133657 (2021)","journal-title":"Ann. Rom. Soc. Cell Biol."},{"issue":"1","key":"36_CR26","first-page":"3512","volume":"25","author":"J Singh","year":"2021","unstructured":"Singh, J.: A bibliometric analysis and visualisation of research trends in corrosion of implants. Ann. Rom. Soc. Cell Biol. 25(1), 3512\u20133520 (2021)","journal-title":"Ann. Rom. Soc. Cell Biol."},{"issue":"15\u201316","key":"36_CR27","first-page":"124","volume":"22","author":"R Ray","year":"2021","unstructured":"Ray, R.: An advanced review on visualisation of research trends in bacterial wilt. Plant Cell Biotechnol. Mol. Biol. 22(15\u201316), 124\u2013132 (2021)","journal-title":"Plant Cell Biotechnol. Mol. Biol."},{"issue":"1","key":"36_CR28","first-page":"3697","volume":"25","author":"A Sharma","year":"2021","unstructured":"Sharma, A.: A bibliometric analysis and visualisation of research trends in cardiac pacemaker battery. Ann. Rom. Soc. Cell Biol. 25(1), 3697\u20133704 (2021)","journal-title":"Ann. Rom. Soc. Cell Biol."},{"key":"36_CR29","doi-asserted-by":"publisher","first-page":"102944","DOI":"10.1016\/j.autcon.2019.102944","volume":"107","author":"C Chen","year":"2019","unstructured":"Chen, C., Tang, L.: BIM-based integrated management workflow design for schedule and cost planning of building fabric maintenance. Autom. Constr. 107, 102944 (2019)","journal-title":"Autom. Constr."},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Marmo, R., Polverino, F., Nicolella, M., Tibaut, A.: Building performance and maintenance information model based on IFC schema. Autom. Constr. 118 (2020)","DOI":"10.1016\/j.autcon.2020.103275"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Matarneh, S.T., Danso-Amoako, M., Al-Bizri, S., Gaterell, M., Matarneh, R.: Building information modeling for facilities management: a literature review and future research directions. J. Build. Eng. 24 (2019)","DOI":"10.1016\/j.jobe.2019.100755"},{"key":"36_CR32","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.buildenv.2016.12.039","volume":"114","author":"S Habibi","year":"2017","unstructured":"Habibi, S.: Micro-climatization and real-time digitalization effects on energy efficiency based on user behavior. Build. Environ. 114, 410\u2013428 (2017)","journal-title":"Build. Environ."},{"key":"36_CR33","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1016\/j.aei.2015.09.004","volume":"29","author":"TW Kang","year":"2015","unstructured":"Kang, T.W., Choi, H.S.: BIM perspective definition metadata for interworking facility management data\u201d. Adv. Eng. Inform. 29, 958\u2013970 (2015)","journal-title":"Adv. Eng. Inform."},{"key":"36_CR34","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.autcon.2017.12.019","volume":"87","author":"K Kim","year":"2018","unstructured":"Kim, K., Kim, H., Kim, W., Kim, C., Kim, J., Yu, J.: Integration of IFC objects and facility management work information using semantic web. Autom. Constr. 87, 173\u2013187 (2018)","journal-title":"Autom. Constr."},{"key":"36_CR35","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.aei.2018.04.001","volume":"36","author":"Y-C Lin","year":"2018","unstructured":"Lin, Y.-C., Lin, C.-P., Hu, H.-T., Su, Y.-C.: Developing final as-built BIM model management system for owners during project closeout: a case study. Adv. Eng. Inform. 36, 178\u2013193 (2018)","journal-title":"Adv. Eng. Inform."},{"key":"36_CR36","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.autcon.2018.03.007","volume":"91","author":"W Chen","year":"2018","unstructured":"Chen, W., Chen, K., Cheng, J.C., Wang, Q., Gan, V.J.: BIM-based framework for automatic scheduling of facility maintenance work orders. Autom. Constr. 91, 15\u201330 (2018)","journal-title":"Autom. Constr."},{"key":"36_CR37","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.autcon.2016.08.043","volume":"72","author":"A Oti","year":"2016","unstructured":"Oti, A., Kurul, E., Cheung, F., Tah, J.: A framework for the utilization of building management system data in building information models for building design and operation. Autom. Constr. 72, 195\u2013210 (2016)","journal-title":"Autom. Constr."},{"key":"36_CR38","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.autcon.2018.04.006","volume":"92","author":"JKW Wong","year":"2018","unstructured":"Wong, J.K.W., Ge, J., He, S.X.: Digitisation in facilities management: a literature review and future research directions. Autom. Constr. 92, 312\u2013326 (2018)","journal-title":"Autom. Constr."},{"key":"36_CR39","doi-asserted-by":"crossref","unstructured":"Chen, L., Shi, P., Tang, Q., Liu, W., Wu, Q.: Development and application of a specification-compliant highway tunnel facility management system based on BIM. Tunn. Undergr. Space Technol. 97 (2020)","DOI":"10.1016\/j.tust.2019.103262"},{"key":"36_CR40","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.aei.2019.01.005","volume":"39","author":"X Gao","year":"2019","unstructured":"Gao, X., Pishdad-Bozorgi, P.: BIM-enabled facilities operation and maintenance: a review. Adv. Eng. Inform. 39, 227\u2013247 (2019)","journal-title":"Adv. Eng. Inform."},{"key":"36_CR41","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.autcon.2012.04.003","volume":"25","author":"W Shen","year":"2012","unstructured":"Shen, W., Hao, Q., Xue, Y.: A loosely coupled system integration approach for decision support in facility management and maintenance. Autom. Constr. 25, 41\u201348 (2012)","journal-title":"Autom. Constr."},{"key":"36_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2016.12.022","volume":"384","author":"X Yu","year":"2017","unstructured":"Yu, X., Yu, Z., Liu, Y., Shi, H.: CI-Rank: Collective importance ranking for keyword search in databases. Inf. Sci. 384, 1\u201320 (2017)","journal-title":"Inf. Sci."},{"key":"36_CR43","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.eswa.2017.12.025","volume":"97","author":"SK Biswas","year":"2018","unstructured":"Biswas, S.K., Bordoloi, M., Shreya, J.: A graph based keyword extraction model using collective node weight. Expert Syst. Appl. 97, 51\u201359 (2018)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"36_CR44","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H.: Applications of blockchains in the internet of things: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1676\u20131717 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"36_CR45","doi-asserted-by":"publisher","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: Review and open research challenges. IEEE Access 7, 10127\u201310149 (2019)","journal-title":"IEEE Access"},{"key":"36_CR46","doi-asserted-by":"publisher","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","volume":"8","author":"M Gupta","year":"2020","unstructured":"Gupta, M., Abdelsalam, M., Khorsandroo, S., Mittal, S.: Security and privacy in smart farming: challenges and opportunities. IEEE Access 8, 34564\u201334584 (2020)","journal-title":"IEEE Access"},{"issue":"12","key":"36_CR47","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.3390\/app8122663","volume":"8","author":"D Preuveneers","year":"2018","unstructured":"Preuveneers, D., Rimmer, V., Tsingenopoulos, I., Spooren, J., Joosen, W., Ilie-Zudor, E.: Chained anomaly detection models for federated learning: an intrusion detection case study. Appl. Sci. 8(12), 2663 (2018)","journal-title":"Appl. Sci."},{"key":"36_CR48","doi-asserted-by":"publisher","first-page":"100832","DOI":"10.1016\/j.jobe.2019.100832","volume":"25","author":"NO Nawari","year":"2019","unstructured":"Nawari, N.O., Ravindran, S.: Blockchain and the built environment: potentials and limitations. J. Build. Eng. 25, 100832 (2019)","journal-title":"J. Build. Eng."},{"issue":"6","key":"36_CR49","doi-asserted-by":"publisher","first-page":"7300","DOI":"10.1109\/TIA.2019.2919820","volume":"55","author":"B Wang","year":"2019","unstructured":"Wang, B., Dabbaghjamanesh, M., Kavousi-Fard, A., Mehraeen, S.: Cybersecurity enhancement of power trading within the networked microgrids based on blockchain and directed acyclic graph approach. IEEE Trans. Ind. Appl. 55(6), 7300\u20137309 (2019)","journal-title":"IEEE Trans. Ind. Appl."},{"key":"36_CR50","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings IEEE Symposium on Security and Privacy, pp. 839\u2013858 (2016)","DOI":"10.1109\/SP.2016.55"},{"issue":"18","key":"36_CR51","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Fairaccess: a new blockchain-based access control framework for the Internet of Things. Security Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Security Commun. Netw."},{"key":"36_CR52","unstructured":"Zyskind, G., Nathan, O., Pentland. A.: Enigma: Decentralized Computation Platform With Guaranteed Privacy (2015). https:\/\/enigma.co\/enigma_full.pdf"},{"key":"36_CR53","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618\u2013623 (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"36_CR54","doi-asserted-by":"crossref","unstructured":"Ali, M.S., Dolui, K., Antonelli, F.: IoT data privacy via blockchains and IPFS. In Proceedings of the 7th International Conference on Internet Things, Art. no. 14 (2017)","DOI":"10.1145\/3131542.3131563"},{"key":"36_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-319-46298-1_21","volume-title":"Network and System Security","author":"M Gupta","year":"2016","unstructured":"Gupta, M., Sandhu, R.: The GURAG administrative model for user and group attribute assignment. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 318\u2013332. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46298-1_21"},{"key":"36_CR56","doi-asserted-by":"crossref","unstructured":"Gupta, M., Patwa, F., Sandhu, R.: An attribute-based access control model for secure big data processing in Hadoop ecosystem. In: Proceedings of the 3rd ACM Workshop Attribute-Based Access Control (ABAC), pp. 13\u201324 (2018)","DOI":"10.1145\/3180457.3180463"},{"key":"36_CR57","doi-asserted-by":"crossref","unstructured":"Mittal, S., Das, P.K., Mulwad, V., Joshi, A., Finin, T.: CyberTwitter: using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 860\u2013867 (2016)","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"36_CR58","doi-asserted-by":"crossref","unstructured":"Piplai, A., Mittal, S., Joshi, A., Finin, T., Holt, J., Zak, R.: Creating cybersecurity knowledge graphs from malware after action reports. Univ. Maryland Baltimore County, Baltimore, MD, USA, Technical Report (2019)","DOI":"10.1109\/ACCESS.2020.3039234"},{"key":"36_CR59","unstructured":"Mittal, S., Joshi, A., Finin, T., Thinking, fast and slow: combining vector spaces and knowledge graphs. arXiv:1708.03310 (2017). http:\/\/arxiv.org\/abs\/1708.03310"},{"key":"36_CR60","doi-asserted-by":"crossref","unstructured":"Neil, L., Mittal, S., Joshi, A.: Mining threat intelligence about open-source projects and libraries from code repository issues and bug reports. In: Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 7\u201312 (2018)","DOI":"10.1109\/ISI.2018.8587375"},{"key":"36_CR61","doi-asserted-by":"crossref","unstructured":"Joshi, K., Joshi, K. P., Mittal, S.: A semantic approach for automating knowledge in policies of cyber insurance services. In: Proceedings of IEEE International Conference on Web Services (ICWS), pp. 33\u201340 (2019)","DOI":"10.1109\/ICWS.2019.00018"},{"key":"36_CR62","unstructured":"Joshi, K.P., Gupta, A., Mittal, S., Pearce, C., Finin, T.: ALDA: cognitive assistant for legal document analytics. In: Proceedings of AAAI Fall Symposium Series, pp. 149\u2013152 (2016)"},{"key":"36_CR63","doi-asserted-by":"crossref","unstructured":"Mittal, S., Joshi, K.P., Pearce, C., Joshi, A.: Automatic extraction of metrics from SLAs for cloud service management. In: Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pp. 139\u2013142 (2016)","DOI":"10.1109\/IC2E.2016.14"},{"key":"36_CR64","doi-asserted-by":"crossref","unstructured":"Joshi, K.P., Gupta, A., Mittal, S., Pearce, C., Joshi, A., Finin, T.: Semantic approach to automating the management of big data privacy policies. In: Proceedings of IEEE International Conference on Big Data (Big Data), pp. 482\u2013491 (2016)","DOI":"10.1109\/BigData.2016.7840639"},{"issue":"6","key":"36_CR65","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s12599-017-0506-0","volume":"59","author":"M Risius","year":"2017","unstructured":"Risius, M., Spohrer, K.: A blockchain research framework. Bus. Inf. Syst. Eng. 59(6), 385\u2013409 (2017)","journal-title":"Bus. Inf. Syst. Eng."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62281-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T23:11:11Z","timestamp":1718320271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62281-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031622809","9783031622816"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62281-6_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}