{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:15Z","timestamp":1775745795577,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,5]]},"DOI":"10.1109\/icaic63015.2025.10848812","type":"proceedings-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:02Z","timestamp":1738176242000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Explaining Cyber Risks in Transportaion 5.0: A Data Driven Approach"],"prefix":"10.1109","author":[{"given":"Binod","family":"Tandan","sequence":"first","affiliation":[{"name":"University of North Texas,Dept. of Informtation Science,Denton,Texas"}]},{"given":"Prashant","family":"Vajpayee","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Informtation Science,Denton,Texas"}]},{"given":"Gahangir","family":"Hossain","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Informtation Science,Denton,Texas"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202404.0924.v1","article-title":"Towards a Conceptual Framework for AI-driven anomaly Detection in Smart City IoT Networks for Enhanced Cybersecurity","author":"Yunis","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/uemcon.2017.8249052"},{"key":"ref3","first-page":"397","article-title":"On the economics of ransomware","volume-title":"Decision and Game Theory for Security: 8th International Conference","author":"Laszka"},{"key":"ref4","article-title":"The US Department of Transportation","journal-title":"Smart City Challenge Vision Statements US Department of Transportation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s22051837"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2022.105548"},{"key":"ref7","article-title":"Whitepaper data-exfiltratie bij een ransomware-aanval","author":"Meurs","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-802117-0.00001-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00055"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380558"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/risks10050091"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-6463-352-8_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10202534"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3209687"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13155"},{"issue":"3","key":"ref17","first-page":"50","article-title":"Industrial Internet of Things security for the transportation infrastructure","volume":"19","author":"Pretorius","year":"2020","journal-title":"Journal of Information Warfare"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2302386"},{"key":"ref20","article-title":"Guide to Conduction Risk Assessment"},{"key":"ref21","article-title":"An Enhanced Risk Formula for Software Security Vuln\u00e9rabilit\u00e9s"}],"event":{"name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2025,2,5]]},"end":{"date-parts":[[2025,2,7]]}},"container-title":["2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10848546\/10848537\/10848812.pdf?arnumber=10848812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:32:35Z","timestamp":1738215155000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icaic63015.2025.10848812","relation":{},"subject":[],"published":{"date-parts":[[2025,2,5]]}}}