{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:08:45Z","timestamp":1763644125405},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,21]]},"DOI":"10.1109\/cloudtech58737.2023.10366070","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:27:46Z","timestamp":1703878066000},"source":"Crossref","is-referenced-by-count":3,"title":["Security Governance in IOT Environment: A State of Art"],"prefix":"10.1109","author":[{"given":"Ilyass","family":"Mokhtari","sequence":"first","affiliation":[{"name":"Mohammed First University,Computer Science Research Laboratory, Faculty of Sciences,Oujda,Morocco"}]},{"given":"Ayyoub","family":"El Outmani","sequence":"additional","affiliation":[{"name":"High Studies of Engineering School, EHEI High Studies of Engineering School, EHEI,Research Center,Oujda,Morocco"}]},{"given":"El Miloud","family":"Jaara","sequence":"additional","affiliation":[{"name":"Mohammed First University,Computer Science Research Laboratory, Faculty of Sciences,Oujda,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35245-4_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26254-8_92"},{"key":"ref3","volume-title":"rp_data-breach-digest-2017-sneak-peek_xg_en.pdf","year":"2023"},{"key":"ref4","article-title":"Persirai: New IoT Botnet Targets IP Cameras","volume-title":"Trend Micro","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/mts.2018.2826079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00013"},{"key":"ref7","volume-title":"IEC 31010:2019","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2017.3680959"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2018.011581520"},{"key":"ref10","volume-title":"ITIL - IT Infrastructure Library | IBM","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25918-1_5"},{"key":"ref12","volume-title":"ISO\/IEC 20000-1:2018","year":"2023"},{"key":"ref13","volume-title":"me_loT-Governance.pdf","year":"2023"}],"event":{"name":"2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","location":"Marrakech, Morocco","start":{"date-parts":[[2023,11,21]]},"end":{"date-parts":[[2023,11,23]]}},"container-title":["2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10365713\/10366053\/10366070.pdf?arnumber=10366070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T21:59:20Z","timestamp":1705096760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10366070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cloudtech58737.2023.10366070","relation":{},"subject":[],"published":{"date-parts":[[2023,11,21]]}}}