{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T04:04:40Z","timestamp":1727323480698},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679377","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"133-138","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Danielle","family":"Hanson","sequence":"first","affiliation":[{"name":"Institute for Cybersecurity Education and Research, North Dakota State University,Fargo,ND,USA"}]},{"given":"Jeremy","family":"Straub","sequence":"additional","affiliation":[{"name":"Institute for Cybersecurity Education and Research, North Dakota State University,Fargo,ND,USA"}]}],"member":"263","reference":[{"volume-title":"State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally","year":"2023","author":"Sinha","key":"ref1"},{"volume-title":"H.R.1668 - IoT Cybersecurity Improvement Act of 2020","year":"2020","key":"ref2"},{"volume-title":"SB-327 Information privacy: connected devices","year":"2018","key":"ref3"},{"article-title":"Enrolled House Bill 2395","volume-title":"80th Oregon Legislative Assembly","year":"2022","key":"ref4"},{"volume-title":"Standards of Internal Control in the Federal Government","year":"2014","key":"ref5"},{"volume-title":"All FAQs","author":"Security","key":"ref6"},{"volume-title":"Gramm-Leach-Bliley Act","year":"1999","key":"ref7"},{"article-title":"PART 314-STANDARDS FOR SAFEGUARDING CUSTOMER INFORMATION","volume-title":"Federal Trade Commission","year":"2002","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2018.08.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51234-1_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0009872103500360"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860757"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238832"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102669"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0101048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/fi12020027"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99136-8_27"},{"key":"ref18","first-page":"315","article-title":"Governance of the Internet of Things","author":"Trautman","year":"2020","journal-title":"Jurimetrics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10101171"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03570-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app13137406"},{"journal-title":"Automated standard based security assessment for IoT","year":"2020","author":"Cirne","key":"ref22"},{"volume-title":"IS Audit Basics: Auditing the IoT","year":"2018","author":"Cooke","key":"ref23"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSPW.2019.00011","volume-title":"An Auditing Framework for Vulnerability Analysis of IoT System","author":"Nadir","year":"2019"},{"volume-title":"An IoT Control Audit Methodology","year":"2017","author":"Jekot","key":"ref25"},{"volume-title":"European Parliament and the Council of the European Union","year":"2016","author":"Data","key":"ref26"},{"volume-title":"H.R.3763 - Sarbanes-Oxley Act of 2002","year":"2002","key":"ref27"},{"volume-title":"Health Insurance Portability and Accountability Act of 1996","year":"1996","key":"ref28"},{"volume-title":"EU Cyber Resilience Act","year":"2023","author":"Commission","key":"ref29"},{"volume-title":"IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices","year":"2019","author":"Meneghello","key":"ref30"},{"volume-title":"IoT Top 10","year":"2024","key":"ref31"},{"volume-title":"Security Issues in IoT: Challenges and Countermeasures","year":"2019","key":"ref32"},{"article-title":"SOC 2\u00ae - SOC for Service Organizations: Trust Services Criteria","volume-title":"AICPA & CIMA","year":"2024","key":"ref33"},{"volume-title":"Are Organizations Actually Performing Risk-Based Audits?","year":"2020","key":"ref34"},{"volume-title":"A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites","year":"2024","author":"Mehmood","key":"ref35"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679377.pdf?arnumber=10679377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:57:20Z","timestamp":1727240240000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679377\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679377","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}