{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T08:16:52Z","timestamp":1772007412863,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T00:00:00Z","timestamp":1765065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T00:00:00Z","timestamp":1765065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,7]]},"DOI":"10.1109\/icta-atsn68371.2025.11398161","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:55:50Z","timestamp":1771966550000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards Blockchain-Backed Command Verification for Automated SOC Defence Actions"],"prefix":"10.1109","author":[{"given":"Khaled","family":"Allanqawi","sequence":"first","affiliation":[{"name":"Kuwait College of Science and Technology (KCST),Faculty of Computer Science and Engineering,Kuwait City,Kuwait"}]},{"given":"Basil","family":"Alothman","sequence":"additional","affiliation":[{"name":"Kuwait College of Science and Technology (KCST),Faculty of Computer Science and Engineering,Kuwait City,Kuwait"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3286985"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cloud.2018.00150"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2021.3120690"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-02324-9"},{"key":"ref5","volume-title":"Strengthening SOC operations with blockchain for tamper-proof incident management","author":"Russell","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi17030108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.53894\/ijirss.v7i4.3449"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.06.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13245050"},{"key":"ref10","volume-title":"Permissioned vs. permissionless ledgers-Blockchain","author":"Pinto","year":"2018"},{"key":"ref11","volume-title":"What is blockchain verification and validation?","author":"Shah","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref13","volume-title":"Trillian","year":"2016"},{"key":"ref14","first-page":"317","article-title":"Efficient data structures for tamper-evident logging","volume-title":"Proc. 18th USENIX Security Symp. (SSYM \u201909)","author":"Crosby","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101999"},{"key":"ref16","article-title":"Open Command and Control (OpenC2) Language Specification Version 2.0","volume-title":"OASIS Standard","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info16010031"},{"key":"ref18","first-page":"1","article-title":"Performance evaluation of the Quorum blockchain platform","volume-title":"Proc. IEEE International Conference on Blockchain (Blockchain)","author":"Baliga","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409199"},{"key":"ref20","volume-title":"Developing the Context Discovery Actuator Profile for OpenC2","author":"Tanzarella","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22186950"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MESA61532.2024.10704913"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA58897.2023.10338915"}],"event":{"name":"2025 10th International Conference on ICT &amp; Accessibility (ICTA) co-located with 2025 2nd International Conference and Forum on Assistive Technologies for Special Needs (ATSN)","location":"Kuwait, Kuwait","start":{"date-parts":[[2025,12,7]]},"end":{"date-parts":[[2025,12,10]]}},"container-title":["2025 10th International Conference on ICT &amp;amp; Accessibility (ICTA) co-located with 2025 2nd International Conference and Forum on Assistive Technologies for Special Needs (ATSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11397903\/11398152\/11398161.pdf?arnumber=11398161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:31:20Z","timestamp":1772004680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11398161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icta-atsn68371.2025.11398161","relation":{},"subject":[],"published":{"date-parts":[[2025,12,7]]}}}