{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:07:28Z","timestamp":1732770448866,"version":"3.29.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10726061","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the Implications of Operations Technology in Cyber Crimes"],"prefix":"10.1109","author":[{"given":"K. Prabhu","family":"Rajasekar","sequence":"first","affiliation":[{"name":"Saveetha University (SIMATS deemed university),School of Law, Cyber Crime and Cyber Law,Chennai,India"}]},{"given":"D.","family":"Vezhaventhan","sequence":"additional","affiliation":[{"name":"SIMATS,Saveetha School of Law,Department of Humanities and Social Sciences,Chennai,India"}]}],"member":"263","reference":[{"key":"ref1","first-page":"163","article-title":"Evaluating the Use of Drones in Forensic Mapping of Crime Scenes","author":"Aasheim","year":"2020","journal-title":"Drones in Criminal Justice"},{"key":"ref2","first-page":"106525","article-title":"A survey of machine learning techniques in Internet of Things (IoT)-enabled industrial systems","volume":"81","author":"Alnajim","year":"2020","journal-title":"Computers & Electrical Engineering"},{"key":"ref3","article-title":"Information assurance: Security in the information environment","author":"Blyth","year":"2004","journal-title":"Springer Science & Business Media"},{"issue":"2","key":"ref4","first-page":"1","article-title":"Getting physical with the digital investigation process","volume":"2","author":"Carrier","year":"2003","journal-title":"International Journal of Digital Evidence"},{"volume-title":"Digital evidence and computer crime: Forensic science, computers, and the Internet","year":"2011","author":"Casey","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/PERCOMW.2017.7917634"},{"year":"2017","journal-title":"TRITON: The First ICS Cyber Attack on Safety Instrument Systems","key":"ref7"},{"issue":"1","key":"ref8","first-page":"5","article-title":"Forensic analysis of a cyber attack on a critical infrastructure: A case study","volume":"5","author":"Garcia","year":"2012","journal-title":"International Journal of Critical Infrastructure Protection"},{"year":"2020","journal-title":"IEC 62443 Industrial communication networks-Network and system security","key":"ref9"},{"issue":"3","key":"ref10","first-page":"316","article-title":"A review of the use of robotics in forensic science","volume":"59","author":"McElroy","year":"2019","journal-title":"Science & Justice"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.6028\/nist.cswp.6"},{"key":"ref12","first-page":"171","article-title":"Forensics in the industrial control environment","author":"Nelson","year":"2016","journal-title":"Critical Infrastructure Protection"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.comnet.2012.12.018"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SP.2010.25"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.6028\/nist.sp.800-82e2008"},{"key":"ref16","article-title":"Secure Edge Computing Architecture in Industrial Internet of Things","author":"Yue","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-030-79997-7_28"},{"volume-title":"Account recovery methods for two-factor authentication (2FA): an exploratory study","year":"2020","author":"Tiller","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-031-42280-5_23"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-031-42280-5_23"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCCI.2019.8821951"},{"issue":"2","key":"ref22","article-title":"Do stories help people adopt two-factor authentication","volume":"1","author":"Fennell","year":"2019","journal-title":"Studies"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.cose.2018.04.002"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.chb.2017.12.001"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10726061.pdf?arnumber=10726061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:27:18Z","timestamp":1732681638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10726061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10726061","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}