{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:20:00Z","timestamp":1774365600679,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s12083-019-0716-y","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:30:26Z","timestamp":1548347426000},"page":"1216-1224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5549-2207","authenticated-orcid":false,"given":"Yannis","family":"Nikoloudakis","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Pallis","sequence":"additional","affiliation":[]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"given":"Charalabos","family":"Skianis","sequence":"additional","affiliation":[]},{"given":"Evangelos K.","family":"Markakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"1","key":"716_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1186\/1471-2458-7-53","volume":"7","author":"HK Andreassen","year":"2007","unstructured":"Andreassen HK , Bujnowska-Fedak MM , Chronaki CE, Dumitru RC, Pudule I, Santana S, Voss H, Wynn R (2007) European citizens\u2019 use of E-health services: a study of seven countries. BMC Public Health 7(1):53","journal-title":"BMC Public Health"},{"issue":"11-12","key":"716_CR2","first-page":"37","volume":"13","author":"J Pope","year":"2016","unstructured":"Pope J (2016) Ransomware: minimizing the risks. Innovations in Clinical Neuroscience 13(11-12):37\u201340","journal-title":"Innovations in Clinical Neuroscience"},{"key":"716_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ijcip.2017.04.001","volume":"19","author":"I Stine","year":"2017","unstructured":"Stine I, Rice M, Dunlap S, John P (2017) A cyber risk scoring system for medical devices. International Journal of Critical Infrastructure Protection 19:32\u201346","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"716_CR4","volume-title":"Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1","author":"Nist","year":"2018","unstructured":"Nist (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Technical report, National institute of standards and technology, Gaithersburg"},{"key":"716_CR5","doi-asserted-by":"crossref","unstructured":"Cao C, Yuan L-P, Singhal A, Liu P, Sun X, Zhu S (2018) Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs. In: Data and applications security and privacy XXXII, Springer, Cham, pp 330\u2013348","DOI":"10.1007\/978-3-319-95729-6_21"},{"issue":"3","key":"716_CR6","first-page":"53","volume":"176","author":"Y Richard","year":"2017","unstructured":"ET, Richard Y, Seth D (2017) Barrier free internet access: evaluating the cyber security risk posed by the adoption of bring your own devices to e-learning network infrastructure. Int J Comput Appl 176(3):53\u201362","journal-title":"Int J Comput Appl"},{"key":"716_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jocs.2017.03.025","volume":"22","author":"M Ficco","year":"2017","unstructured":"Ficco M, Chora\u015b M, Kozik R (2017) Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J Comput Sci 22:179\u2013186","journal-title":"J Comput Sci"},{"key":"716_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.simpat.2016.09.007","volume":"73","author":"A Furfaro","year":"2017","unstructured":"Furfaro A, Argento L, Parise A, Antonio P (2017) Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simul Model Pract Theory 73:43\u201354","journal-title":"Simul Model Pract Theory"},{"key":"716_CR9","doi-asserted-by":"crossref","unstructured":"Vilalta R, Ciungu R, Mayoral A, Casellas R, Martinez R, Pubill D, Serra J, Munoz R, Christos V (2016) Improving security in internet of things with software defined networking. In: IEEE global communications conference (GLOBECOM), IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7841889"},{"issue":"11","key":"716_CR10","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/MCOM.2017.1700105","volume":"55","author":"EK Markakis","year":"2017","unstructured":"Markakis EK, Karras K, Sideris A, Alexiou G, Pallis E (2017) Computing, caching, and communication at the edge: the cornerstone for building a versatile 5G ecosystem. IEEE Commun Mag 55(11):152\u2013157","journal-title":"IEEE Commun Mag"},{"key":"716_CR11","volume-title":"Engineering Information Security","author":"J Stuart","year":"2011","unstructured":"Stuart J (2011) Engineering Information Security. John Wiley, Hoboken"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-0716-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-0716-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-0716-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T19:24:14Z","timestamp":1579807454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-0716-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":11,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["716"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-0716-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,24]]},"assertion":[{"value":"16 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}