{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T05:47:18Z","timestamp":1751867238356,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,24]]},"DOI":"10.1109\/csnet56116.2022.9955607","type":"proceedings-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T15:12:10Z","timestamp":1669648330000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Assumpcao","sequence":"first","affiliation":[{"name":"Federal University of Rio de Janeiro (UFRJ),Brazilian Mint (CMB),Rio de Janeiro,Brazil"}]},{"given":"Carlos","family":"Oliveira","sequence":"additional","affiliation":[{"name":"National Institute of Metrology, Quality, and Technology,Duque de Caxias,RJ,Brazil"}]},{"given":"Pablo","family":"Ortiz","sequence":"additional","affiliation":[{"name":"National Institute of Metrology, Quality, and Technology,Duque de Caxias,RJ,Brazil"}]},{"given":"Wilson","family":"Melo","sequence":"additional","affiliation":[{"name":"National Institute of Metrology, Quality, and Technology,Duque de Caxias,RJ,Brazil"}]},{"given":"Luiz","family":"Carmo","sequence":"additional","affiliation":[{"name":"National Institute of Metrology, Quality, and Technology,Duque de Caxias,RJ,Brazil"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s20082328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840777"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/10168664.2018.1461536"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C.2019.00016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2016.37"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102382"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900374"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-021-00253-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3028708"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2021.9345650"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982964"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3410447"},{"key":"ref6","first-page":"1","article-title":"Sensors fin-gerprints using machine learning: a case study on dam monitoring systems","author":"assumpcao","year":"2022","journal-title":"2022 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)"},{"journal-title":"Service account and table quotas in amazon dynamodb","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.3041098"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/978-3-030-39445-5_51","article-title":"IT Security for Measuring Instruments: Confidential Checking of Software Functionality","volume":"1129 aisc","author":"peters","year":"2020","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2019.1633689"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s20133730"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1504\/IJSN.2022.123294","article-title":"Using blockchains to protect critical infrastructures: a comparison between ethereum and hyperledger fabric","volume":"17","author":"melo","year":"2022","journal-title":"International Journal of Security and Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DependSys51298.2020.00018"},{"key":"ref20","first-page":"1","article-title":"A micro service-enabled architecture for smart surveillance using blockchain technology","author":"nagothu","year":"2018","journal-title":"2018 IEEE International Smart Cities Conference (ISC2)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116333"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507732"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/14759217211036880"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.2559036"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0994-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"}],"event":{"name":"2022 6th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2022,10,24]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,10,26]]}},"container-title":["2022 6th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9955594\/9955595\/09955607.pdf?arnumber=9955607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T14:59:22Z","timestamp":1671461962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9955607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,24]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csnet56116.2022.9955607","relation":{},"subject":[],"published":{"date-parts":[[2022,10,24]]}}}