{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:44Z","timestamp":1767340244457,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/etfa.2019.8869162","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T23:18:52Z","timestamp":1571354332000},"page":"1035-1042","source":"Crossref","is-referenced-by-count":15,"title":["Cybersecurity Challenges in Large Industrial IoT Systems"],"prefix":"10.1109","author":[{"given":"Bjorn","family":"Leander","sequence":"first","affiliation":[]},{"given":"Aida","family":"Causevic","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-4991.2008.00272.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.103"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"journal-title":"Microsoft Azure IoT Reference Architecture","year":"2018","key":"ref10"},{"journal-title":"Internet of Things (IoT) security architecture","year":"2018","author":"shahan","key":"ref11"},{"journal-title":"Common Vulnerability Scoring System","year":"2019","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"ref14","first-page":"161","article-title":"Cyber-pysical Systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1007\/978-1-4419-5906-5_134","author":"avoine","year":"2011","journal-title":"Encyclopedia of Cryptography and Security RFID Security"},{"key":"ref17","first-page":"191","article-title":"Kerberos: An Authentication Service for Open Network Systems","author":"steiner","year":"1988","journal-title":"WTEC 1988 Proceedings of the USENIX Winter 1988 Technical Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00153-X"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1007\/978-1-4419-5906-5_16","author":"schoenmakers","year":"2011","journal-title":"Encyclopedia of Cryptography and Security Zero-Knowledge"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.488"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"journal-title":"Trust in Cyberspace","year":"1999","author":"madsen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"journal-title":"The STRIDE Threat Model","year":"2005","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2016.2618724"},{"journal-title":"Tech Rep","article-title":"The Industrial Internet of Things Volume G1: Reference Architecture","year":"2017","key":"ref7"},{"journal-title":"Smart manufacturing-reference architecture model industry 4 0 (rami4 0)","year":"2016","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298r2"},{"journal-title":"Industrial Internet of Things Volume G4 Security Framework","year":"2016","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-0613-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"journal-title":"Tech Rep","article-title":"ISO\/IEC 19770-2:2015 IT Asset Management Part 2: Software Identification tag","year":"2015","key":"ref21"},{"key":"ref24","article-title":"SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust","author":"defrawy","year":"2012","journal-title":"NDSS"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1308","DOI":"10.1007\/978-1-4419-5906-5_718","author":"challener","year":"2011","journal-title":"Encyclopaedia of Cryptography and Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1007\/978-1-4419-5906-5_631","author":"gu","year":"2011","journal-title":"Encyclopedia of Cryptography and Security Intrusion Detection in Ad Hoc Networks"}],"event":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2019,9,10]]},"location":"Zaragoza, Spain","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8851311\/8868236\/08869162.pdf?arnumber=8869162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:13Z","timestamp":1658155753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8869162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/etfa.2019.8869162","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}