{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T05:47:21Z","timestamp":1751867241775,"version":"3.37.3"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100015321","name":"Nara Institute of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,20]]},"DOI":"10.1109\/ciot57267.2023.10084910","type":"proceedings-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T17:27:05Z","timestamp":1680542825000},"page":"225-230","source":"Crossref","is-referenced-by-count":2,"title":["A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology"],"prefix":"10.1109","author":[{"given":"Mohammad Hafiz","family":"Hersyah","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Nara,Japan"}]},{"given":"Md Delwar","family":"Hossain","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Nara,Japan"}]},{"given":"Yuzo","family":"Taenaka","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Nara,Japan"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology,Division of Information Science,Nara,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2022.03.030"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/scc.2013.12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2174\/2352096510666170601091846"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icsess.2017.8343029"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icodse48700.2019.9092727"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9427-5"},{"key":"ref7","article-title":"ISO\/IEC 27005. In: Information Security Risk Management","author":"Klipper","year":"2011","journal-title":"Vieweg + Teubner"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/itqmis51053.2020.9322976"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/worlds450073.2020.9210410"},{"key":"ref10","article-title":"Governance, Risk, and Compliance","author":"Stewart","year":"2021","journal-title":"CompTIA Security + Review Guide: Exam SY0-601"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411619080078"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3229345.3229361"},{"volume-title":"Information technology-Security techniques - Code of practice for information security management, originally published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC)","year":"2005","key":"ref13"},{"volume-title":"Information technology-Security techniques - Code of practice for information security management, originally published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC)","year":"2005","key":"ref14"},{"volume-title":"Information technology-Security techniques-Information security risk management, published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC)","year":"2011","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icrse.2015.7366430"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/icqr2mse.2012.6246200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ic2e.2014.17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1057\/jos.2012.20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/annsim52504.2021.9552116"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2172\/835920"},{"volume-title":"Expression of Needs and Identification of Security Objectives (EBIOS)---Risk Management Method","year":"2018","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2013.6733583"},{"volume-title":"Group TeamTNT","year":"2022","key":"ref25"},{"key":"ref26","article-title":"MITRE ATTCK for Industrial Control Systems: Design and Philosophy","author":"Otis","year":"2020","journal-title":"The MITRE Corporation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/cecit53797.2021.00022"},{"volume-title":"National Institute of Standards National Institute of Standards and Technology (NIST) 800-30","key":"ref28"},{"volume-title":"Taking TeamTNTs Docker Images Offline","year":"2021","author":"Stroud","key":"ref29"},{"volume-title":"Team TNT -- The First Crypto-Mining Worm to Steal AWS Credentials","year":"2020","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2018.01.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.066"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-48318-9","volume-title":"Multiple Attribute Decision Making: Methods and Applications","author":"Hwang","year":"1981"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon44009.2020.9249757"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/mcc.2016.100"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/secdev.2019.00027"},{"volume-title":"National Vulnerability Database","key":"ref37"}],"event":{"name":"2023 6th Conference on Cloud and Internet of Things (CIoT)","start":{"date-parts":[[2023,3,20]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2023,3,22]]}},"container-title":["2023 6th Conference on Cloud and Internet of Things (CIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10084443\/10084872\/10084910.pdf?arnumber=10084910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T15:30:32Z","timestamp":1707838232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10084910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,20]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ciot57267.2023.10084910","relation":{},"subject":[],"published":{"date-parts":[[2023,3,20]]}}}