{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:24:29Z","timestamp":1730193869404,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1109\/acit53391.2021.9677393","type":"proceedings-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T16:26:35Z","timestamp":1642436795000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Applying NIST SP 800-161 in Supply Chain Processes Empowered by Artificial Intelligence"],"prefix":"10.1109","author":[{"given":"Lamees","family":"Al-Alawi","sequence":"first","affiliation":[]},{"given":"Raiya","family":"Al-Busaidi","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"286","article-title":"Risk and Disaster Management: From Planning and Expertise to Smart, Intelligent, and Adaptive Systems","volume":"247","author":"benis","year":"2018","journal-title":"Studies in Health Technology and Informatics"},{"year":"2009","author":"jahankhani","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SIMSYM.2003.1192809"},{"journal-title":"Managing cyber risk in supply chains a review and research agenda","year":"2019","author":"ghadge","key":"ref13"},{"journal-title":"CAN A SINGLE SECURITY FRAMEWORK ADDRESS INFORMATION SECURITY RISKS ADEQUATELY&#x0192;","year":"2012","author":"al-ahmad","key":"ref14"},{"journal-title":"ISO 27004 - Information Security Metrics Implementation - Checkmate","year":"2013","author":"sudan","key":"ref15"},{"journal-title":"COBIT 3rd Edition Control Objectives","year":"2020","key":"ref16"},{"journal-title":"COSO Framework What it is and How to Use it | i-Sight","year":"2019","author":"snook","key":"ref17"},{"journal-title":"Risk management framework (rmf) overview","year":"2020","author":"petters","key":"ref18"},{"article-title":"Risk Management Framework (RMF): An Overview","year":"2019","author":"paulsen","key":"ref19"},{"key":"ref28","first-page":"3204","article-title":"Risk Assessment for Cyber Physical Systems: An Approach for Smart Grid","author":"al zadjali","year":"2016","journal-title":"27th IBIMA Conference"},{"journal-title":"Assessing disaster risks in supply chains | Emerald Insight","year":"2014","author":"lockamy","key":"ref4"},{"key":"ref27","first-page":"11966","article-title":"LIRA: Learnable, Imperceptible and Robust Backdoor Attacks","author":"doan","year":"2021","journal-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision"},{"journal-title":"AI in Supply & Procurement - IEEE Conference Publication","year":"0","author":"chopra","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.10.004"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3477","DOI":"10.1007\/s00521-016-2253-4","article-title":"Incorporated risk metrics and hybrid AI techniques for risk management","volume":"28","author":"lin","year":"2016","journal-title":"Neural Computing and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102104"},{"key":"ref7","first-page":"148","article-title":"Artificial Intelligence and Cyber Security &#x2013; A Shield against Cyberattack as a Risk Business Management Tool &#x2013; Case of European Countries","volume":"21","author":"mosteanu","year":"2020","journal-title":"Information Security Management"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1530476"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.12.004"},{"journal-title":"How AI Is Transforming Global Supply Chains","year":"2020","author":"mefford","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986979"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/IJLM-04-2012-0028"},{"article-title":"NIST Special Publication 800-161: Supply Chain Risk Management Practices for Federal Information Systems and Organizations","year":"2015","author":"boyens","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.09.009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03226-4_12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref25","first-page":"22","article-title":"The self-thinking supply chain","volume":"25","author":"calatayud","year":"2018","journal-title":"Supply Chain Management"}],"event":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2021,12,21]]},"location":"Muscat, Oman","end":{"date-parts":[[2021,12,23]]}},"container-title":["2021 22nd International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9677036\/9677041\/09677393.pdf?arnumber=9677393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:57:48Z","timestamp":1652187468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9677393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/acit53391.2021.9677393","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}