{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:44Z","timestamp":1740100964825,"version":"3.37.3"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council (EPSRC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation (UKRI)","doi-asserted-by":"publisher","award":["EP\/R033749\/1,EP\/V039164\/1"],"award-info":[{"award-number":["EP\/R033749\/1,EP\/V039164\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888883","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Security Risks of Net Zero Technologies"],"prefix":"10.1109","author":[{"given":"Haiyue","family":"Yuan","sequence":"first","affiliation":[{"name":"Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury, Kent,UK"}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury, Kent,UK"}]}],"member":"263","reference":[{"volume-title":"Global warming of 1.5\u00b0C. an ipcc special report on the impacts of global warming of 1.5\u00b0C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change, sustainable development and efforts to eradicate poverty","year":"2018","author":"Masson-Delmotte","key":"ref1"},{"volume-title":"Net zero by 2050: A roadmap for the global energy sector","year":"2021","author":"Bouckaert","key":"ref2"},{"volume-title":"UK becomes first major economy to pass net zero emissions law","year":"2019","key":"ref3"},{"volume-title":"Reducing greenhouse gas emissions","year":"2020","key":"ref4"},{"volume-title":"COP26: Together for our planet","year":"2021","key":"ref5"},{"volume-title":"COP26: The Glasgow Climate Pact","year":"2021","key":"ref6"},{"volume-title":"IRENA - International Renewable Energy Agency","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsc.2019.10.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.115627"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2019.08.092"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90812-6_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/jiec.12145"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107492"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2021.112474"},{"volume-title":"A European strategy for low-emission mobility","year":"2016","key":"ref15"},{"volume-title":"Transport and environment statistics: 2021 annual report","year":"2021","author":"Millen","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41558-018-0141-x"},{"volume-title":"Sector, gas, and uncertainty summary factsheets - greenhouse gas emissions","year":"2020","key":"ref18"},{"volume-title":"Tackling climate change through livestock: A global assessment of emissions and mitigation opportunities","year":"2013","author":"Millen","key":"ref19"},{"volume-title":"Farming for failure","year":"2020","author":"Millen","key":"ref20"},{"volume-title":"Emissions due to agriculture: Global, regional and country trends 2000\u20132018","year":"2013","author":"Millen","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.12.035"},{"volume-title":"Digital technologies and human transformations","year":"2019","key":"ref23"},{"key":"ref24","article-title":"Securing a net-zero future: Cyber risks to the energy transition","author":"Dawda","year":"2022","journal-title":"Royal United Services Institute (RUSI), Emerging Insights"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2858789"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.124"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2020.111631"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1422"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129197"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3131815"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS-C52956.2021.00075"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS-C53483.2021.00040"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities4010022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/nclimate2685"},{"volume-title":"Three revolutions in urban transportation: How to achieve the full potential of vehicle electrification, automation, and shared mobility in urban transportation systems around the world by 2050","year":"2017","author":"Fulton","key":"ref35"},{"key":"ref36","first-page":"75","article-title":"Smart building and current technologies","volume-title":"Smart Technologies and Design For Healthy Built Environments","author":"Ming","year":"2021"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2922409"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2019.09.030"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2020.111902"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.04.027"},{"volume-title":"The sixth carbon budget: Manufacturing and construction","year":"2020","key":"ref42"},{"volume-title":"Digital technology and the planet: Harnessing computing to achieve net zero","year":"2020","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/s22010032"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4031\/MTSJ.54.6.9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.4031\/MTSJ.55.2.4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/er.5631"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC50192.2020.9309494"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/computers9040083"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2021.1959526"},{"volume-title":"What does metaverse cybersecurity mean and imply?","year":"2022","author":"Parvez","key":"ref54"},{"key":"ref55","article-title":"Security considerations for virtual reality systems","author":"Viswanathan","year":"2022","journal-title":"arXiv"},{"key":"ref56","article-title":"The security of smart buildings: a systematic literature review","author":"Ciholas","year":"2019","journal-title":"arXiv"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3454127.3457625"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1111\/epi.17046"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3051675"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101660"},{"volume-title":"UKRI awards \u00a32 million Network Plus grant","year":"2020","key":"ref61"},{"volume-title":"VNI complete forecast highlights","year":"2018","key":"ref62"},{"volume-title":"The sustainable future of video entertainment: From creation to consumption","year":"2020","author":"Evans","key":"ref63"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8873429"},{"key":"ref66","article-title":"Verifiable credentials data model v1.1","author":"Sporny","year":"2022","journal-title":"W3C, W3C Recommendation"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888883.pdf?arnumber=9888883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T04:47:54Z","timestamp":1726030074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888883","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}