{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:17:02Z","timestamp":1760300222470,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/icm.2018.8704100","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:49:41Z","timestamp":1556837381000},"page":"40-43","source":"Crossref","is-referenced-by-count":8,"title":["Improvement of security system level in the Cyber-Physical Systems (CPS) architecture"],"prefix":"10.1109","author":[{"given":"Anwer","family":"Mbiriki","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chaker","family":"Katar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed","family":"Badreddine","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref11","first-page":"157l","volume":"22","author":"wan","year":"2017","journal-title":"Cloud-Assisted Cyber-Physical Systems for the Implementation of Industry 4 0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1063\/1.4982543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.7.01"},{"key":"ref14","article-title":"Industrie 4.0 L'usine connecte","author":"abbal","year":"2013","journal-title":"Gimlec - Industrie 4 0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.031"},{"year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"year":"0","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2014.27"},{"key":"ref3","first-page":"1932","article-title":"Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data","author":"zhang","year":"2015","journal-title":"IEEE Systems Journal"},{"key":"ref6","first-page":"111","article-title":"Park A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing","author":"kim","year":"2016","journal-title":"Microprocessors and Microsystems 0 0 0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927154"},{"key":"ref8","article-title":"Roman Fiedler Acquiring Cyber Threat Intelligence through Security Information Correlation Austrian Institute of Technology Donau-City-Strasse 1, 1220 Vienna, Austria","author":"settanni","year":"2017","journal-title":"2017 3rd IEEE International Conference on Cybernetics (CYBCONF)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2017.8085965"},{"journal-title":"Cyber-Physical Systems Security-A Survey","year":"2017","author":"humayed","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858319"}],"event":{"name":"2018 30th International Conference on Microelectronics (ICM)","start":{"date-parts":[[2018,12,16]]},"location":"Sousse, Tunisia","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 30th International Conference on Microelectronics (ICM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8698775\/8703878\/08704100.pdf?arnumber=8704100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:54:02Z","timestamp":1558392842000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8704100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icm.2018.8704100","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}