{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:18:23Z","timestamp":1776284303008,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472434","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards an Adaptive and Dynamic Risk Management Framework for OT Cybersecurity"],"prefix":"10.1109","author":[{"given":"Nourhan","family":"Halawi Ghoson","sequence":"first","affiliation":[{"name":"Arts et M&#x00E9;tiers &#x2013; Science et Technologie,Paris,France"}]},{"given":"Zakaria","family":"Bencherki","sequence":"additional","affiliation":[{"name":"Arts et M&#x00E9;tiers &#x2013; Science et Technologie,Paris,France"}]},{"given":"Nisar","family":"Hakam","sequence":"additional","affiliation":[{"name":"Arts et M&#x00E9;tiers &#x2013; Science et Technologie,Paris,France"}]},{"given":"Khaled","family":"Benfriha","sequence":"additional","affiliation":[{"name":"Arts et M&#x00E9;tiers &#x2013; Science et Technologie,Paris,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2019.119869"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3056650"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.69554\/EAZH4262"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2016.331"},{"key":"ref5","article-title":"The Essential Guide to the IEC 62443 industrial cybersecurity standards","author":"Gordon"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/jcp4020018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icitee49829.2020.9271748"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.c6511.098319"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2021920981"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc.2017.7868444"},{"key":"ref11","article-title":"Analysis of frameworks \/ methods for information security risk management","volume-title":"Master Thesis, \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b9\u03bf \u03a0\u03b5\u03b9\u03c1\u03b1\u03b9\u03ce\u03c2","author":"Chandrinos","year":"2023"},{"key":"ref12","article-title":"BSI-Standard 200-2: IT-Grundschutz-Methodology","volume-title":"Federal Office for Information Security"},{"key":"ref13","article-title":"Security standards applying to all European Commission information systems - European Commission"},{"key":"ref14","article-title":"Information Risk Assessment Methodology 2 (IRAM2)","volume-title":"Information Security Forum"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.014223"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icce-taiwan58799.2023.10226923"},{"key":"ref17","article-title":"Pyramid of Pain","volume-title":"AttackIQ"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/idsta55301.2022.9923170"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/uemcon.2018.8796822"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470476"},{"key":"ref21","article-title":"OpenCTI Documentation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104295"},{"key":"ref23","article-title":"NVD - Home"},{"key":"ref24","article-title":"Industrial Control Systems | Cybersecurity and Infrastructure Security Agency CISA"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.55324\/josr.v2i11.1477"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09976-0"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472434.pdf?arnumber=11472434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:24:21Z","timestamp":1776281061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472434","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}