{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:53:14Z","timestamp":1756993994177,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,3]]},"DOI":"10.1109\/cita58204.2023.10262535","type":"proceedings-article","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T17:33:02Z","timestamp":1695835982000},"page":"37-42","source":"Crossref","is-referenced-by-count":1,"title":["Security of Cloud-Assisted BANs Using Digital Twin"],"prefix":"10.1109","author":[{"given":"Najm Us","family":"Sama","sequence":"first","affiliation":[{"name":"Universiti Malaysia Sarawak,Faculty of Computer Science and Information Technology,Kota Samarahan, Sarawak,Malaysia,94300"}]},{"given":"Kartinah","family":"Zen","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Sarawak,Faculty of Computer Science and Information Technology,Kota Samarahan, Sarawak,Malaysia,94300"}]},{"given":"Aziz","family":"Ud Din","sequence":"additional","affiliation":[{"name":"University of Peshawar,Shaikh Zayed Islamic Center,Peshawar,Pakistan"}]},{"given":"Nazia","family":"Azim","sequence":"additional","affiliation":[{"name":"Abdul Wali Khan University,Mardan,Pakistan"}]},{"given":"Atiq","family":"Ur Rahman","sequence":"additional","affiliation":[{"name":"Higher Colleges of Technology,Faculty of Computer Information Science,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s20102913"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032680"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24018\/ejece.2022.6.3.437"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01840-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.007"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.21833\/ijaas.2022.02.006","article-title":"To explore the pharmacological mechanism of action using digital twin","volume":"9","author":"rahman","year":"2022","journal-title":"Int J Adv Appl Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5574376"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.016"},{"journal-title":"Cyber security digital twin simulations for wireless networks","year":"2023","author":"xing","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108061"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102258"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3273282"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2023.02.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241588"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2023.102744"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-021-00538-3"},{"journal-title":"A Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystems","year":"2020","author":"lamba","key":"ref22"},{"journal-title":"Challenges and Opportunities in CPS Security A Physics-based Perspective","year":"2020","author":"ahmed","key":"ref21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS49240.2020.9257708"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2990749"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103469"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102211"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/asi5040079"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.06.023"}],"event":{"name":"2023 13th International Conference on Information Technology in Asia (CITA)","start":{"date-parts":[[2023,8,3]]},"location":"Kota Samarahan, Malaysia","end":{"date-parts":[[2023,8,4]]}},"container-title":["2023 13th International Conference on Information Technology in Asia (CITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10262399\/10262497\/10262535.pdf?arnumber=10262535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:56:31Z","timestamp":1697478991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10262535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cita58204.2023.10262535","relation":{},"subject":[],"published":{"date-parts":[[2023,8,3]]}}}