{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:20:18Z","timestamp":1761157218809},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527937","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"source":"Crossref","is-referenced-by-count":8,"title":["Toward Automated Threat Modeling of Edge Computing Systems"],"prefix":"10.1109","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[{"name":"University of Naples Federico II,Department of Electrical Engineering and Information Technology,Naples,Italy"}]},{"given":"Alessandra De","family":"Benedictis","sequence":"additional","affiliation":[{"name":"University of Naples Federico II,Department of Electrical Engineering and Information Technology,Naples,Italy"}]},{"given":"Carlo","family":"Mazzocca","sequence":"additional","affiliation":[{"name":"University of Naples Federico II,Department of Electrical Engineering and Information Technology,Naples,Italy"}]},{"given":"Rebecca","family":"Montanari","sequence":"additional","affiliation":[{"name":"University of Naples Federico II,Department of Electrical Engineering and Information Technology,Naples,Italy"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"key":"ref11","article-title":"The STRIDE Threat Model","year":"2009"},{"key":"ref12","article-title":"NIST Special Publication 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations","year":"2013"},{"key":"ref13","article-title":"The Ten Most Critical Web Application Security Risks","year":"2017"},{"key":"ref14","article-title":"Top Threats to Cloud Computing: Egregious Eleven","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"},{"key":"ref17","article-title":"SSL Threat Model","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref3","first-page":"1","article-title":"A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things","author":"alwarafy","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref6","first-page":"147","article-title":"Soteria: Automated IoT Safety and Security Analysis","author":"celik","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.033"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100056"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730672"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.145"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.7"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527937.pdf?arnumber=9527937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:29:34Z","timestamp":1659482974000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527937","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}