{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T03:14:20Z","timestamp":1775358860598,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icaiic57133.2023.10066994","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:38:05Z","timestamp":1679593085000},"page":"553-557","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Security in Fog Computing Using Blockchain: A Mini Literature Review"],"prefix":"10.1109","author":[{"given":"Norah Arif","family":"Alhumam","sequence":"first","affiliation":[{"name":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"}]},{"given":"Noura Saud","family":"Alyemni","sequence":"additional","affiliation":[{"name":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"}]},{"given":"M M","family":"Hafizur Rahman","sequence":"additional","affiliation":[{"name":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172110"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22744-9_46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8819545"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107246"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911969"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03190-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3770"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2903254"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800356"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i6.pp5081-5088"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700271"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/jsan8010015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1304579"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FWC.2017.8368523"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946404"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1821804"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"ref21","article-title":"Cloud Computing Explained - Cloud Computing - Simplilearn","year":"2018","journal-title":"YouTube"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.018"}],"event":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","location":"Bali, Indonesia","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10066849\/10066958\/10066994.pdf?arnumber=10066994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:48:21Z","timestamp":1710395301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10066994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icaiic57133.2023.10066994","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}