{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:29:40Z","timestamp":1772908180238,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876987","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Security Risk Assessment of Humanoid Robotics: DARWIN-OP2 as Case Study"],"prefix":"10.1109","author":[{"given":"Khalil M.","family":"Ahmad Yousef","sequence":"first","affiliation":[{"name":"The Hashemite University,Faculty of Engineering,Computer Engineering Department,Zarqa,Jordan,13133"}]},{"given":"Bassam J.","family":"Mohd","sequence":"additional","affiliation":[{"name":"The Hashemite University,Faculty of Engineering,Computer Engineering Department,Zarqa,Jordan,13133"}]},{"given":"Mohammad","family":"Amra","sequence":"additional","affiliation":[{"name":"The Hashemite University,Faculty of Engineering,Computer Engineering Department,Zarqa,Jordan,13133"}]},{"given":"Yazeed","family":"Kamel","sequence":"additional","affiliation":[{"name":"The Hashemite University,Faculty of Engineering,Computer Engineering Department,Zarqa,Jordan,13133"}]},{"given":"Anas","family":"AlMajali","sequence":"additional","affiliation":[{"name":"The Hashemite University,Faculty of Engineering,Computer Engineering Department,Zarqa,Jordan,13133"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Robotic operating system"},{"key":"ref2","article-title":"Cyber Kill Chain"},{"key":"ref3","article-title":"vsftpd 2.3.4 backdoor","year":"2011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11370-024-00540-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5455\/jjcit.71-1535447790"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTA.2017.8251984"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00545-8"},{"key":"ref8","first-page":"30","article-title":"The methodology for assessing information security risks for robotic systems","volume-title":"CEUR Workshop Proceedings","volume":"2667","author":"Basan"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363657"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2017.7929597"},{"issue":"20","key":"ref11","article-title":"Automated vulnerability exploitation using deep reinforcement learning","volume-title":"Applied Sciences","volume":"14","author":"AlMajali","year":"2024"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","location":"Zarqa, Jordan","start":{"date-parts":[[2024,12,10]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876987.pdf?arnumber=10876987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:01Z","timestamp":1740081481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876987","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}