{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T09:34:25Z","timestamp":1768815265910,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10307363","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Cyber Security Implementation Issues in Small to Medium-sized Enterprises (SMEs) and their Potential Solutions: A Comprehensive Analysis"],"prefix":"10.1109","author":[{"given":"Saral","family":"Kandpal","sequence":"first","affiliation":[{"name":"Graphic Era Hill University,Department of CSE,Bhimtal,India"}]},{"given":"Sachin","family":"Bhatt","sequence":"additional","affiliation":[{"name":"Graphic Era Hill University,Department of CSE,Bhimtal,India"}]},{"given":"Lalit","family":"Mohan","sequence":"additional","affiliation":[{"name":"Graphic Era Hill University,Department of CSE,Bhimtal,India"}]},{"given":"Amit","family":"Patwal","sequence":"additional","affiliation":[{"name":"Uka Tarsadia University,Department of CSE,Gujarat,India"}]},{"given":"Pushpendra","family":"Kumar","sequence":"additional","affiliation":[{"name":"Uka Tarsadia University,Department of Computer Science,Gujarat,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS.2019.8703609"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SMART50582.2020.9337108"},{"key":"ref3","article-title":"Per\u00fa - A prueba de ataques cibern\u00e9ticos","year":"2017","journal-title":"Desde Adentro"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI49556.2020.9140980"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769470"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316387"},{"key":"ref7","article-title":"The growing threat of mobile device security bre aches the growing threat","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.221"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AICT47866.2019.8981796"},{"key":"ref10","article-title":"Hacking the Skills Shortage","author":"Report","year":"2016","journal-title":"A study of the international shortage in cybersecurity skills"},{"issue":"1","key":"ref11","article-title":"It Security Threats and Challenges for Small Firms: Managers\u2019 Perceptions","volume":"12","author":"Watad","year":"2018","journal-title":"Int. J. Acad. Bus. World"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/0266242614542853"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx093"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394272"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026063"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800506"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858471"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3917\/sim.173.0007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/cybersa49311.2020.9139638"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN45266.2019.8995022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/sims.2016.7802895"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Delhi, India","start":{"date-parts":[[2023,7,6]]},"end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10307363.pdf?arnumber=10307363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T23:22:23Z","timestamp":1710372143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10307363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10307363","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}