{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:48:44Z","timestamp":1774655324097,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130008","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"672-678","source":"Crossref","is-referenced-by-count":2,"title":["Knowledge Systematization for Security Orchestration in CPS and IoT Systems"],"prefix":"10.1109","author":[{"given":"Phu","family":"Nguyen","sequence":"first","affiliation":[{"name":"SINTEF,Oslo,Norway"}]},{"given":"Hui","family":"Song","sequence":"additional","affiliation":[{"name":"SINTEF,Oslo,Norway"}]},{"given":"Rustem","family":"Dautov","sequence":"additional","affiliation":[{"name":"SINTEF,Oslo,Norway"}]},{"given":"Nicolas","family":"Ferry","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; C&#x00F4;te d&#x2019;Azur, I3S, Sophia Antipolis,France"}]},{"given":"Angel","family":"Rego","sequence":"additional","affiliation":[{"name":"TECNALIA,Derio,Spain"}]},{"given":"Erkuden","family":"Rios","sequence":"additional","affiliation":[{"name":"TECNALIA,Derio,Spain"}]},{"given":"Eider","family":"Iturbe","sequence":"additional","affiliation":[{"name":"TECNALIA,Derio,Spain"}]},{"given":"Valeria","family":"Valdes","sequence":"additional","affiliation":[{"name":"Montimage,Paris,France"}]},{"given":"Ana Rosa","family":"Cavalli","sequence":"additional","affiliation":[{"name":"Montimage,Paris,France"}]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[{"name":"Montimage,Paris,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"ref3","first-page":"4","volume-title":"Access Control for Cyber-Physical Systems","author":"Martinelli","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16088-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781351174664-338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-4_24"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.02.009","article-title":"Challenges in the vulnerability and risk analysis of critical infrastructures","volume":"152","author":"Zio","year":"2016","journal-title":"Reliability Engineering & System Safety"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888808"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894307"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947652"},{"key":"ref12","volume-title":"Guidelines for performing systematic literature reviews in software engineering","author":"Kitchenham","year":"2007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1335-7_14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58923-3_11"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"103201","DOI":"10.1016\/j.cose.2023.103201","article-title":"Testing soar tools in use","volume":"129","author":"Bridges","year":"2023","journal-title":"Computers & Security"},{"key":"ref16","article-title":"Identifying expertise gaps in cyber incident response: Cyber defender needs vs. technological development","author":"Nyre-Yu","year":"2021","journal-title":"scholarspace"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786853"},{"key":"ref18","article-title":"IoT: Architecture","year":"2018","journal-title":"Juxtology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3305268"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.016240"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130008.pdf?arnumber=11130008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:11:02Z","timestamp":1756271462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130008","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}