{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T20:46:07Z","timestamp":1762029967677,"version":"build-2065373602"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,28]]},"DOI":"10.1109\/acit50332.2020.9300050","type":"proceedings-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T20:37:09Z","timestamp":1609792629000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Exploring Cyber Security Measures in Smart Cities"],"prefix":"10.1109","author":[{"given":"Rami Mustafa A.","family":"Mohammad","sequence":"first","affiliation":[]},{"given":"Mamoun Masoud","family":"Abdulqader","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"489","article-title":"Privacy in the Smart City-Applications, Technologie, Challenges, and Solutions","volume":"xx","author":"david","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref32","first-page":"177","article-title":"Impact of Privacy Issues on Smart City Services in a Model Smart City","volume":"x","author":"nasser h","year":"2019","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"ref31","article-title":"Privacy Conscious Architecture for improving Emergency Response in Smart cities","author":"ramya","year":"2016","journal-title":"2016 Smart City Security and Privacy Workshop (SCSP-W)"},{"key":"ref30","article-title":"Energy ecosystem in smart cities-Privacy and security solutions for citizen's engagement in a multi-stream environment","author":"mihai","year":"2016","journal-title":"2016 IEEE International Smart Cities Conference (ISC2)"},{"key":"ref10","article-title":"A Study on smart city security policy based on block chain in 5G Age","author":"jongho","year":"0","journal-title":"2019 International Conference on Platform Technology and Service (PlatCon)"},{"key":"ref11","article-title":"Efficient and Secure Communications in Smart Cities using Edge, Caching, and Blockchain","author":"khashayar","year":"0","journal-title":"IEEE International Smart Cities Conference (ISC2"},{"key":"ref12","article-title":"Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City","author":"adeel","year":"2019","journal-title":"SECON 2019 workshop on Security Trust and Privacy in Emerging Cyber-Physical Systems"},{"key":"ref13","article-title":"Security Structure Study of City Management Platform Based on Cloud Computing under the Conception of Smart City","author":"wang","year":"0","journal-title":"2012 Fourth International Conference on Multimedia Information Networking and Security"},{"key":"ref14","article-title":"Towards Cloud based Smart Cities Data Security","author":"zaheer","year":"0","journal-title":"2014 IEEE\/ACM 7th International Conference on Utility and Cloud Computing"},{"key":"ref15","article-title":"Empowering the Security for Iot-Based Communications in Smart City","author":"vishesh","year":"0","journal-title":"2018 International Conference on Automation and Computational Engineering (ICACE-2018)"},{"key":"ref16","article-title":"Security Requirements of IoT Applications in Smart Environment","author":"deepti","year":"0","journal-title":"2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)"},{"key":"ref17","article-title":"A Use Case in Cybersecurity based in Blockchain to deal with the security and privacy of citizens and Smart Cities Cyberinfrastructures","author":"olga","year":"0","journal-title":"IEEE International Smart Cities Conference (ISC2)"},{"key":"ref18","article-title":"How Digital Identity on Blockchain can contribute in a smart city environment","author":"rogelio","year":"0","journal-title":"2017 International Smart Cities Conference (ISC2)"},{"key":"ref19","article-title":"Data Security and Threat Modeling for Smart City","author":"paul","year":"0","journal-title":"2015 International Conference on Cyber Security of Smart Cities Industrial Control System and Communications (SSIC)"},{"key":"ref28","article-title":"Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment","author":"shaheena","year":"2019","journal-title":"IEEE Access"},{"key":"ref4","first-page":"755","article-title":"LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities","volume":"v","author":"travis","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref27","article-title":"Framework for managing smart cities security and privacy applications","author":"modafar","year":"0","journal-title":"2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)"},{"key":"ref3","article-title":"Access Control Architecture for Smart City IoT Platform","author":"takayuki","year":"0","journal-title":"2019 18th IEEE International Conference On Trust Security And Privacy In Computing And"},{"key":"ref6","article-title":"Spectrum Requirement for IoT Services: A case of Jakarta smart city","author":"diah","year":"2017","journal-title":"2017 IEEE International Conference on Communication"},{"key":"ref29","first-page":"46134","article-title":"Security and Privacy in Smart Cities: Challenges and Opportunities","volume":"vi","author":"lei","year":"2018","journal-title":"IEEE Access"},{"key":"ref5","first-page":"716","article-title":"Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cites","volume":"v","author":"wenjia","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref8","article-title":"A Survey of Security and Privacy Issues in IoT for smart cities","author":"saba","year":"0","journal-title":"2017 Fifth International Conference on Aerospace Science & Engineering (ICASE)"},{"key":"ref7","article-title":"A Survey on IoT Architectures, Protocols, Security and Smart City based Applications","author":"parul","year":"0","journal-title":"2017 8th International Conference on Computing Communication and Networking Technologies (ICCCNT)"},{"key":"ref2","article-title":"AD-IoT: Anomaly Detection of IoT Cyberattacks in Samrt City Using Machine Learning","author":"ibrahim","year":"0","journal-title":"2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)"},{"key":"ref9","article-title":"SMARTIE Project: Secure loT Data Management for Smart Cites","author":"jens","year":"2015","journal-title":"2015 International Conference on Recent Advances in Internet of Things (RIoT) RIoT"},{"key":"ref1","article-title":"A Secure IoT Architecture for Smart Cities","author":"shaibal","year":"0","journal-title":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"},{"key":"ref20","article-title":"A Probability based Model for Big Data Security in Smart City","author":"vishal","year":"0","journal-title":"2019 4th MEC International Conference on Big Data and Smart City (ICBDSC"},{"key":"ref22","article-title":"A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities","author":"jun","year":"2015","journal-title":"IEEE Access"},{"key":"ref21","article-title":"A framework for evaluation of cyber security challenges in smart cities","author":"mohammad","year":"0","journal-title":"2018 Smart City Symposium"},{"key":"ref24","article-title":"A Study of Security Modeling Techniques for Smart Systems","author":"dipty","year":"2019","journal-title":"2019 International Conference on Machine Learning Big Data Cloud and Parallel Computing (Com-IT-Con)"},{"key":"ref23","first-page":"152585","article-title":"A Multi-Tiered Defense Model for the Security Analysis of Critical Facilities in Smart","author":"nazeeruddin","year":"2019","journal-title":"IEEE Access"},{"key":"ref26","article-title":"Secure Framework for Future Smart City","author":"hamza","year":"0","journal-title":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing"},{"key":"ref25","article-title":"Designing cyber security system for smart cities","author":"nandita","year":"0","journal-title":"2018 Smart City Symposium"}],"event":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2020,11,28]]},"location":"Giza, Egypt","end":{"date-parts":[[2020,11,30]]}},"container-title":["2020 21st International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9299884\/9299962\/09300050.pdf?arnumber=9300050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:41:28Z","timestamp":1656344488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9300050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,28]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/acit50332.2020.9300050","relation":{},"subject":[],"published":{"date-parts":[[2020,11,28]]}}}