{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T04:07:23Z","timestamp":1754021243382,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1109\/camad59638.2023.10478410","type":"proceedings-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T18:38:23Z","timestamp":1711564703000},"page":"80-86","source":"Crossref","is-referenced-by-count":2,"title":["Providing Security Assurance &amp; Hardening for Open Source Software\/Hardware: The SecOPERA approach"],"prefix":"10.1109","author":[{"given":"Apostolos P.","family":"Fournaris","sequence":"first","affiliation":[{"name":"Industrial Systems Institute,Research Center ATHENA,Patras,Greece"}]},{"given":"Christos","family":"Tselios","sequence":"additional","affiliation":[{"name":"Industrial Systems Institute,Research Center ATHENA,Patras,Greece"}]},{"given":"Evangelos","family":"Haleplidis","sequence":"additional","affiliation":[{"name":"Industrial Systems Institute,Research Center ATHENA,Patras,Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"University of Cyprus,Nicosia,Cyprus"}]},{"given":"Antreas","family":"Dionysiou","sequence":"additional","affiliation":[{"name":"University of Cyprus,Nicosia,Cyprus"}]},{"given":"Dimitrios","family":"Mitropoulos","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business,Department of Management Science and Technology,Athens,Greece"}]},{"given":"Panos","family":"Louridas","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business,Department of Management Science and Technology,Athens,Greece"}]},{"given":"Georgios","family":"Christou","sequence":"additional","affiliation":[{"name":"Technical University of Crete,School of Electrical and Computer Engineering,Greece"}]},{"given":"Manos","family":"Athanatos","sequence":"additional","affiliation":[{"name":"Technical University of Crete,School of Electrical and Computer Engineering,Greece"}]},{"given":"George","family":"Hatzivasilis","sequence":"additional","affiliation":[{"name":"Technical University of Crete,School of Electrical and Computer Engineering,Greece"}]},{"given":"Konstantinos","family":"Georgopoulos","sequence":"additional","affiliation":[{"name":"Technical University of Crete,School of Electrical and Computer Engineering,Greece"}]},{"given":"Costas","family":"Kalogeros","sequence":"additional","affiliation":[{"name":"AEGIS IT RESEARCH LTD,Germany"}]},{"given":"Christos","family":"Kotselidis","sequence":"additional","affiliation":[{"name":"Pierer Innovation,Austria"}]},{"given":"Simon","family":"Vogl","sequence":"additional","affiliation":[{"name":"VoXel Interaction Design,Linz,Austria"}]},{"given":"Francois","family":"Hamon","sequence":"additional","affiliation":[{"name":"GreenCitizen,Marseille,France"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Technical University of Crete,School of Electrical and Computer Engineering,Greece"}]}],"member":"263","reference":[{"volume-title":"Open Source Security and Risk Analysis (OSSRA) Report","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42051-2_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"issue":"9","key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/s22093375","article-title":"Melding fog computing and iot for deploying secure, response-capable healthcare services in 5g and beyond","volume":"22","author":"Tselios","year":"2022","journal-title":"Sensors"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534091"},{"journal-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","year":"2015","author":"Abadi","key":"ref6"},{"volume-title":"PyTorch: An Imperative Style, HighPerformance Deep Learning Library","year":"2019","author":"Paszke","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647681"},{"issue":"3","key":"ref9","doi-asserted-by":"crossref","DOI":"10.3390\/electronics6030052","article-title":"Exploiting hardware vulnerabilities to attack embedded system devices: a survey of potent microarchitectural attacks","volume":"6","author":"Fournaris","year":"2017","journal-title":"Electronics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383902"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10591-4_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33826-7_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icse43902.2021.00146"},{"issue":"6","key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/app10061965","article-title":"A smart water metering deployment based on the fog computing paradigm","volume":"10","author":"Amaxilatis","year":"2020","journal-title":"Applied Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422489"}],"event":{"name":"2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2023,11,6]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2023,11,8]]}},"container-title":["2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10478373\/10478374\/10478410.pdf?arnumber=10478410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:45:22Z","timestamp":1711658722000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10478410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/camad59638.2023.10478410","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]}}}