{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:25Z","timestamp":1759331845368},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T00:00:00Z","timestamp":1662508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T00:00:00Z","timestamp":1662508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,7]]},"DOI":"10.1109\/iccst52959.2022.9896499","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T20:59:34Z","timestamp":1664225974000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Current Preventive Approaches in the Context of Cybersecurity"],"prefix":"10.1109","author":[{"given":"Mimi Enakome","family":"Oka","sequence":"first","affiliation":[{"name":"Tomas Bata University in Zlin,Faculty of Applied Informatics,Deparment of Security Engineering,Zlin,Czech Republic"}]},{"given":"Martin","family":"Hromada","sequence":"additional","affiliation":[{"name":"Tomas Bata University in Zlin,Faculty of Applied Informatics,Department of Security Engineering,Zlin,Czech Republic"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/rmir.12169"},{"journal-title":"Accenture-2019-cost of cybercrime-study-final pdf","year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref4","article-title":"The role of cybersecurity updates and patches in addressing cybersecurity threats and vulnerabilities","author":"ojowuni","year":"2022","journal-title":"A case study of recent cybersecurity attacks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"ref6","article-title":"Reasearch paper on cybersecurity","author":"sheth","year":"2021","journal-title":"Contemporary research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2012.58061"},{"key":"ref8","article-title":"Analyzing of zero-day attck and its identification techniques","author":"vaisla","year":"0","journal-title":"First international conference on advances in computing and communication engineering (ICACCE_2014)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/0735648X.2019.1692426"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/0735648X.2019.1691855"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCC53858.2021.00031"},{"key":"ref9","article-title":"Review of cybersecurityframeworks: Context and shared concepts","author":"azmi","year":"0","journal-title":"Journal of Cyber Policy"},{"year":"0","key":"ref20"},{"journal-title":"National Institutite of Standards and Technolgogy Cybersecurity Framework","year":"2014","key":"ref22"},{"year":"0","key":"ref21"},{"key":"ref23","article-title":"The future of cybersecurity in internal audit","author":"jamison","year":"0","journal-title":"A joint research report by the Internal Audit Foundation and Crowe"}],"event":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2022,9,7]]},"location":"Vale\u010d u Hrotovic, Czech Republic","end":{"date-parts":[[2022,9,9]]}},"container-title":["2022 IEEE International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9896399\/9896404\/09896499.pdf?arnumber=9896499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:49:23Z","timestamp":1665780563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9896499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccst52959.2022.9896499","relation":{},"subject":[],"published":{"date-parts":[[2022,9,7]]}}}