{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:35:59Z","timestamp":1770755759015,"version":"3.50.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679467","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"833-838","source":"Crossref","is-referenced-by-count":2,"title":["Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes"],"prefix":"10.1109","author":[{"given":"Spyridon","family":"Papastergiou","sequence":"first","affiliation":[{"name":"Research and Innovation, Maggiolli SPA,Greece"}]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[{"name":"Anglia Ruskin University,Department of Computing and Information Science,UK"}]},{"given":"Eleni Maria","family":"Kalogeraki","sequence":"additional","affiliation":[{"name":"Security Lab Consulting,Ireland"}]},{"given":"Argyro","family":"Chatzopoulou","sequence":"additional","affiliation":[{"name":"ApiroPlus Solutions,Cyprus"}]},{"given":"Panagiotis","family":"Bountakas","sequence":"additional","affiliation":[{"name":"Sphynx Technology Solutions AG,Greece"}]},{"given":"Konstantinos","family":"Pournaras","sequence":"additional","affiliation":[{"name":"p-NET Emerging Networks &#x0026; Verticals,Greece"}]},{"given":"Sreedevi","family":"Beena","sequence":"additional","affiliation":[{"name":"Red Alerts Labs,France"}]},{"given":"Nineta","family":"Polemi","sequence":"additional","affiliation":[{"name":"trustilio BV,Netherlands"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.01.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2022.02.016"},{"key":"ref3","volume-title":"Industry 4.0 - Cybersecurity Challenges and Recommendations"},{"key":"ref4","journal-title":"Cybersecurity Act"},{"key":"ref5","article-title":"Common Criteria Part 1","volume-title":"Common Criteria for Information Technology Security Evaluation, under their applicable ISO\/IEC 15408 version or under their applicable version published on","volume":"1"},{"key":"ref6","journal-title":"PP are widely used by consumer groups and communities of interest, may become standards and be referenced into EU regulation"},{"key":"ref7","journal-title":"European Cyber Security Certification"},{"key":"ref8","volume-title":"General Secretariat of the Council, No. prev, doc.: 12930\/22, Subject: Council conclusions on ICT supply chain security - Council conclusions approved by the Council at its meeting on 17 October 2022"},{"key":"ref9","volume-title":"The EU cybersecurity certification framework"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3403\/30362618u"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3403\/30362604"},{"key":"ref12","journal-title":"OSCAL: the Open Security Controls Assessment Language"},{"issue":"18","key":"ref13","article-title":"An integrated cyber security risk management framework and risk predication for the critical infrastructure protection","volume-title":"Neural Computing and Applications","volume":"34","author":"Kure","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-220689"},{"key":"ref15","journal-title":"A Certification approach for dynamic, agile and reUSable assessmenT fOr composite systems of ICT proDucts, servicEs, and processes (CUSTODES)"},{"key":"ref16","journal-title":"Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats(certMILS)"},{"key":"ref17","volume-title":"EU Cyber Resilience Act"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679467.pdf?arnumber=10679467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:23:17Z","timestamp":1727241797000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679467","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}