{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:28:48Z","timestamp":1766428128510,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688297","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T06:09:15Z","timestamp":1555049355000},"page":"1-9","source":"Crossref","is-referenced-by-count":25,"title":["Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace"],"prefix":"10.1109","author":[{"given":"Gabriela","family":"Ahmadi-Assalemi","sequence":"first","affiliation":[]},{"given":"Haider M.","family":"al-Khateeb","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Epiphaniou","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Cosson","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Jahankhani","sequence":"additional","affiliation":[]},{"given":"Prashant","family":"Pillai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1108\/14637151011092973"},{"key":"ref38","first-page":"100","author":"rudin","year":"0","journal-title":"Occupancy monitoring system for campus sports facilities using the Internet of Things (IoT)"},{"journal-title":"Insider threat Prevention detection mitigation and deterrence","year":"2016","author":"gelles","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600087NM"},{"key":"ref31","article-title":"A Blockchain Based Liability Attribution Framework for Autonomous Vehicles","author":"chuka","year":"2018","journal-title":"Cryptography and Security (cs CR)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781118851678.ch3"},{"key":"ref37","first-page":"3142","author":"haverinen","year":"0","journal-title":"A global self-localization technique utilizing local anomalies of the ambient magnetic field"},{"key":"ref36","first-page":"1","author":"binu","year":"0","journal-title":"An efficient indoor location tracking and navigation system using simple magnetic map matching"},{"key":"ref35","first-page":"26","author":"mundie","year":"0","journal-title":"Toward an Ontology for Insider Threat Research Varieties of Insider Threat Definitions"},{"journal-title":"Industrial Espionage and Information Security","year":"0","author":"button","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2275-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref11","first-page":"234","author":"kamm\u00fcller","year":"0","journal-title":"Attack Tree Analysis for Insider Threats on the IoT Using Isabelle"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700625"},{"key":"ref13","first-page":"146","author":"shafi","year":"0","journal-title":"Cyber Physical Systems Security A Brief Survey"},{"key":"ref14","first-page":"1","author":"wu","year":"0","journal-title":"Risk assessment method for cyber security of cyber physical systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2569446"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2782751"},{"key":"ref18","first-page":"1","author":"bajramovic","year":"0","journal-title":"Forensic readiness of smart buildings Preconditions for subsequent cybersecurity tests"},{"key":"ref19","first-page":"71","author":"mansfield","year":"0","journal-title":"Design Space Exploration for Secure Building Control"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800137"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"journal-title":"A Blockchain Based Liability Attribution Framework for Autonomous Vehicles","year":"2018","author":"oham","key":"ref27"},{"journal-title":"Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures","article-title":"European Union Agency For Network And Information Security (ENISA)","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.diin.2017.06.015","article-title":"Future challenges for smart cities: Cyber-security and digital forensics","volume":"22","author":"baig","year":"2017","journal-title":"Digital Investigation"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.14763\/2017.1.455","article-title":"Towards responsive regulation of the Internet of Things: Australian perspectives","volume":"6","author":"richardson","year":"2017","journal-title":"Internet Policy Review"},{"key":"ref5","first-page":"547","author":"giaffreda","year":"0","journal-title":"A pragmatic approach to solving IoT interoperability and security problems in an eHealth context"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2014.0046"},{"key":"ref7","article-title":"Top strategic predictions for 2016 and beyond: The future is a digital thing","volume":"291252","author":"plummer","year":"2015","journal-title":"Gartner Res"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30028-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"journal-title":"Hackers use DDoS Attack to Cut Heat to Apartments","year":"2016","author":"mathews","key":"ref20"},{"key":"ref22","first-page":"1","author":"postr\u00e1neck\u00fd","year":"0","journal-title":"Smart city near to 4 0 - an adoption of industry 4 0 conceptual model"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.003"},{"journal-title":"B-CoC A Blockchain-based Chain of Custody for Evidences Management in Digital Forensics","year":"2018","author":"bonomi","key":"ref42"},{"key":"ref24","first-page":"211","author":"kwak","year":"0","journal-title":"Know your master Driver profiling-based anti-theft method"},{"key":"ref41","first-page":"278","author":"teng","year":"0","journal-title":"Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"ref26","first-page":"1","author":"boyes","year":"0","journal-title":"Enabling intelligent cities through cyber security of building information and building systems"},{"journal-title":"IoT-Forensics Meets Privacy Towards Cooperative Digital Investigations","year":"2018","author":"nieto","key":"ref43"},{"key":"ref25","first-page":"953","author":"hallac","year":"0","journal-title":"Driver identification using automobile sensor data from a single turn"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","start":{"date-parts":[[2019,1,16]]},"location":"London, United Kingdom","end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688297.pdf?arnumber=8688297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:12:51Z","timestamp":1657854771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688297","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}