{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:04:29Z","timestamp":1775563469958,"version":"3.50.1"},"reference-count":14,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":62,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.043","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"717-724","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Threat Modeling a Solution Integrating Blockchain and Artificial Intelligence for Agro-Food Traceability"],"prefix":"10.1016","volume":"278","author":[{"given":"Andr\u00e9","family":"Guerra","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Lemos","sequence":"additional","affiliation":[]},{"given":"Patr\u00edcio","family":"Domingues","sequence":"additional","affiliation":[]},{"given":"Carlos Machado","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Marisa","family":"Maximiano","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"V\u00edtor","family":"T\u00e1vora","sequence":"additional","affiliation":[]},{"given":"Orlando","family":"Rem\u00e9dios","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.procs.2026.03.043_bib1","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1007\/s43681-024-00427-4","article-title":"\u201cArtificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI,\u201d","volume":"5","author":"Malatji","year":"2025","journal-title":"AI Ethics"},{"issue":"2","key":"10.1016\/j.procs.2026.03.043_bib2","doi-asserted-by":"crossref","first-page":"1720","DOI":"10.30574\/wjarr.2024.21.2.0607","article-title":"\u201cThe intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities,\u201d","volume":"21","author":"Sontan","year":"2024","journal-title":"World J. Adv. Res. Rev."},{"issue":"2","key":"10.1016\/j.procs.2026.03.043_bib3","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s42979-022-01020-4","article-title":"\u201cCybersecurity, Data Privacy and Blockchain: A Review,\u201d","volume":"3","author":"Wylde","year":"2022","journal-title":"SN Comput. Sci."},{"issue":"3","key":"10.1016\/j.procs.2026.03.043_bib4","doi-asserted-by":"crossref","first-page":"100193","DOI":"10.1016\/j.bcra.2024.100193","article-title":"\u201cBlockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review,\u201d","volume":"5","author":"Shamsan Saleh","year":"2024","journal-title":"Blockchain Res. Appl."},{"key":"10.1016\/j.procs.2026.03.043_bib5","unstructured":"OWASP Foundation, \u201cThreat Dragon,\u201d 2025. Available: https:\/\/owasp.org\/www-project-threat-dragon\/. [Accessed: Feb. 10, 2025]"},{"key":"10.1016\/j.procs.2026.03.043_bib6","doi-asserted-by":"crossref","unstructured":"R. Khan, K. McLaughlin, D. Laverty, and S. Sezer, \u201cSTRIDE-based threat modeling for cyber-physical systems,\u201d in 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Sept. 2017, pp. 1\u20136. doi: 10.1109\/ISGTEurope.2017.8260283. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/8260283. [Accessed: Mar. 17, 2025]","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"10.1016\/j.procs.2026.03.043_bib7","unstructured":"Isabel Barber\u00e1, \u201cPLOT4AI - Library,\u201d 2025. Available: https:\/\/plot4.ai\/library. [Accessed: July 18, 2025]"},{"issue":"4","key":"10.1016\/j.procs.2026.03.043_bib8","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1080\/17445760.2024.2352740","article-title":"\u201cSybil attack vulnerability trilemma,\u201d","volume":"39","author":"Platt","year":"2024","journal-title":"Int. J. Parallel Emergent Distrib. Syst."},{"issue":"4","key":"10.1016\/j.procs.2026.03.043_bib9","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.3390\/app13042231","article-title":"\u201cA Secure and Decentralized Authentication Mechanism Based on Web 3.0 and Ethereum Blockchain Technology,\u201d","volume":"13","author":"Petcu","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.procs.2026.03.043_bib10","doi-asserted-by":"crossref","unstructured":"O. Sa\u00dfnick, T. Rosenstatter, C. Sch\u00e4fer, and S. Huber, \u201cSTRIDE-based Methodologies for Threat Modeling of Industrial Control Systems: A Review,\u201d in 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS), May 2024, pp. 1\u20138. doi: 10.1109\/ICPS59941.2024.10639949. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10639949. [Accessed: July 18, 2025]","DOI":"10.1109\/ICPS59941.2024.10639949"},{"issue":"1","key":"10.1016\/j.procs.2026.03.043_bib11","first-page":"57","article-title":"\u201cThe Art of Threat Modeling,\u201d","volume":"1","author":"Hammami","year":"2024","journal-title":"J. Comput. Sci. Inform."},{"key":"10.1016\/j.procs.2026.03.043_bib12","unstructured":"GS1, \u201cEPCIS & CBV,\u201d 2025. Available: https:\/\/www.gs1.org\/standards\/epcis. [Accessed: Apr. 07, 2025]"},{"key":"10.1016\/j.procs.2026.03.043_bib13","unstructured":"Anthropic, \u201cModel Context Protocol (MCP),\u201d Anthropic, 2025. Available: https:\/\/docs.anthropic.com\/en\/docs\/mcp. [Accessed: June 30, 2025]"},{"key":"10.1016\/j.procs.2026.03.043_bib14","unstructured":"OWASP Foundation, \u201cTop 10 Risk & Mitigations for LLMs and Gen AI Apps,\u201d 2025 Top 10 Risk & Mitigations for LLMs and Gen AI Apps, 2025. Available: https:\/\/genai.owasp.org\/llm-top-10\/. [Accessed: Mar. 17, 2025]"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006356?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006356?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:21:51Z","timestamp":1775560911000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926006356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":14,"alternative-id":["S1877050926006356"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.043","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Threat Modeling a Solution Integrating Blockchain and Artificial Intelligence for Agro-Food Traceability","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.043","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}