{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:19:09Z","timestamp":1772644749724,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825755","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"6336-6345","source":"Crossref","is-referenced-by-count":7,"title":["Automated Knowledge Framework for IoT Cybersecurity Compliance"],"prefix":"10.1109","author":[{"given":"Ikechukwu","family":"Oranekwu","sequence":"first","affiliation":[{"name":"Texas A&#x0026;M University - Central Texas,Dept. of Computer Information Systems,Killeen,USA"}]},{"given":"Lavanya","family":"Elluri","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University - Central Texas,Dept. of Computer Information Systems,Killeen,USA"}]},{"given":"Gunjan","family":"Batra","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Dept. of Information Systems and Security,Kennesaw,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800x.1029"},{"key":"ref2","article-title":"Internet of things cybersecurity improvement act of 2020","volume-title":"Tech. Rep.","year":"2020"},{"key":"ref3","article-title":"Improving the nation\u2019s cybersecurity","volume-title":"Tech. Rep.","author":"House","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8259"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8228"},{"key":"ref6","article-title":"Bar chart for internet of things (iot) and non-iot active device connections worldwide from 2010 to 2025 (in billions) [chart]","volume-title":"Statista","author":"Vailshery","year":"2022"},{"key":"ref7","article-title":"Review on knowledge graph techniques","author":"Xu","year":"2016","journal-title":"Dianzi Keji Daxue Xuebao\/Journal of the University of Electronic Science and Technology of China"},{"key":"ref8","volume-title":"SPARQL 1.1 Overview","year":"2013"},{"key":"ref9","first-page":"1","article-title":"A survey on the web of things","volume":"1","author":"Sciullo","year":"2022","journal-title":"Journal of Internet of Things"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3111477"},{"key":"ref11","article-title":"Nist special publication 800-53 revision 5","year":"2020"},{"key":"ref12","volume-title":"Semantic web programming","author":"Hebeler","year":"2011"},{"key":"ref13","volume-title":"A semantic web primer","author":"Antoniou","year":"2004"},{"key":"ref14","volume-title":"Explorer\u2019s guide to the semantic web","author":"Passin","year":"2004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386545"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008964"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386276"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-2066-8_2"},{"key":"ref19","article-title":"Privcomp-kg: Leveraging knowledge graph and large language models for privacy policy compliance verification","author":"Garza","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671834"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurityHPSCIDS52275.2021.00013"},{"key":"ref22","article-title":"Deep semantic compliance advisor for unstructured document compliance checking","author":"Guo","year":"2021","journal-title":"IBM Research China"},{"key":"ref23","article-title":"Enhancing emergency decision-making with knowledge graphs and large language models","author":"Chen","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00050"},{"key":"ref25","article-title":"An ontology-based cybersecurity framework for the internet of things","author":"Mozzaquatro","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046442"},{"key":"ref27","article-title":"The iot and the new eu cybersecurity regulatory landscape","author":"Chiara","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5678-0_34"},{"key":"ref29","article-title":"Retrieval-augmented generation with knowledge graphs for customer service question answering","author":"Xu","year":"2022"},{"key":"ref30","volume-title":"Web Ontology Language","year":"2004"},{"key":"ref31","volume-title":"Resource Description Framework","year":"2014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386545"},{"key":"ref33","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref34","article-title":"Chain-of-thought prompting elicits reasoning in large language models","author":"Wei","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451760"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.295"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825755.pdf?arnumber=10825755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:48:12Z","timestamp":1737100092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825755","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}