{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:24:01Z","timestamp":1773548641005,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/ice\/itmc58018.2023.10332371","type":"proceedings-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T18:48:01Z","timestamp":1701715681000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["An ontology-based model for evaluating cloud attack scenarios in CATS \u2013 a serious game in cloud security"],"prefix":"10.1109","author":[{"given":"Tiange","family":"Zhao","sequence":"first","affiliation":[{"name":"Siemens AG,Munich,Germany"}]},{"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich,Neubiberg,Germany"}]},{"given":"Maria","family":"Pinto-Albuquerque","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio de Lisboa (ISCTE-IUL),Lisboa,Portugal"}]},{"given":"Didem","family":"Ongu","sequence":"additional","affiliation":[{"name":"Siemens AG,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The industrial control system cyber kill chain","volume":"1","author":"Assante","year":"2015","journal-title":"SANS Institute InfoSec Reading Room"},{"key":"ref2","journal-title":"Network service discovery"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.24071\/ijiet.v5i1.2825"},{"key":"ref4","year":"2023","journal-title":"Cloud matrix"},{"key":"ref5","journal-title":"CVE-2020-1206"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533084"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2018-0020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314230"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86797-3_25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86797-3_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2014.71"},{"key":"ref13","article-title":"A three cycle view of design science research","volume":"19","author":"Hevner","year":"2007","journal-title":"Scandinavian Journal of Information Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"ref15","year":"2015","journal-title":"ISO\/IEC 27017:2015 Information technology \u2014 Security techniques \u2014 Code of practice for information security controls based on ISO\/IEC 27002 for cloud services"},{"key":"ref16","year":"2019","journal-title":"ISO\/IEC 27018:2019Information technology \u2014 Security techniques \u2014 Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors"},{"key":"ref17","article-title":"Control systems cyber security: Defense in depth strategies","author":"Kuipers","year":"2006","journal-title":"Technical report, Idaho National Laboratory (INL)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref19","year":"2023","journal-title":"Vulnerability metrics"},{"key":"ref20","year":"2023","journal-title":"Vulnerability metrics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijedudev.2021.102444"},{"key":"ref22","author":"Shostack","year":"2022","journal-title":"Tabletop security games + cards"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"ref24","year":"2022","journal-title":"Market growth forecast for public cloud services worldwide from 2011 to 2023**"},{"key":"ref25","author":"Johannesson","year":"2007","journal-title":"Serious games: An overview"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITiME.2012.6291488"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2013.91"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/info12110482"},{"key":"ref29","article-title":"Exploring a Board Game to Improve Cloud Security Training in Industry","volume-title":"Second International Computer Programming Education Conference","volume":"91","author":"Zhao"},{"key":"ref30","first-page":"6:1","article-title":"Cloud of Assets and Threats: A Playful Method to Raise Awareness for Cloud Security in Industry","volume-title":"Third International Computer Programming Education Conference, volume 102 of Open Access Series in Informatics (OASIcs)","author":"Zhao"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0272-9_5"}],"event":{"name":"2023 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)","location":"Edinburgh, United Kingdom","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,22]]}},"container-title":["2023 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10332254\/10332258\/10332371.pdf?arnumber=10332371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:23:57Z","timestamp":1725081837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10332371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ice\/itmc58018.2023.10332371","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}