{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:07Z","timestamp":1774631467828,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/is.2018.8710531","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T17:58:26Z","timestamp":1557424706000},"page":"870-876","source":"Crossref","is-referenced-by-count":87,"title":["Smart Farming: Cyber Security Challenges"],"prefix":"10.1109","author":[{"given":"Luis","family":"Barreto","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Amaral","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"E. Parliament, of the processing of personal data, and on free movement of such data","year":"2016","journal-title":"General Data Protection Regulation"},{"key":"ref10","first-page":"12","article-title":"A Review : Autonomous Agribot For Smart Farming","volume":"4","author":"shah","year":"2016","journal-title":"International Journal of Industrial Electronics and Electrical Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/09600039810247461"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2013.09.006"},{"key":"ref13","first-page":"172","article-title":"Development of Traceability System of Aquatic Foods Supply Chain Based on RFID and EPC Internet of Things","volume":"29","author":"yan","year":"2013","journal-title":"Transactions of the Chinese Society of Agricultural Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfoodeng.2015.11.009"},{"key":"ref15","article-title":"The Missing Link Supply Chain and Digital Maturity Digital Technologies Offer a Shot in the Arm for Traditional Supply Chains","author":"dougados","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2014.12.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/10576100590905110"},{"key":"ref18","article-title":"Cybersecurity Opportunities, Threats Challenges","author":"society","year":"2016"},{"key":"ref19","article-title":"Internet Security Alliance","year":"2018"},{"key":"ref28","year":"2018","journal-title":"Blockchain in Transport Alliance (BiTA)"},{"key":"ref4","first-page":"442","article-title":"Agri-IoT: A Semantic Framework for Internet of Things-Enabled Smart Farming Applications","author":"kamilaris","year":"2017","journal-title":"2016 IEEE 3rd World Forum on Internet of Things WF-IoT 2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859675"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s16111884"},{"key":"ref6","article-title":"Modeling for Smart Cyber-Physical Systems: Application to Farming Systems","author":"combemale","year":"2016","journal-title":"2016 Workshop in Software and System Engineering for Cyber-Physical System"},{"key":"ref29","article-title":"Cyber Data Attacks: Are Farmers and Agribusiness Exempt?","author":"aasness","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2017.09.045"},{"key":"ref8","article-title":"The Impact of IoT on Agriculture","author":"ravindra","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V11P296"},{"key":"ref2","article-title":"Input to the Commission on Enhancing National Cybersecurity: The Impact of Security Ratings on National Cybersecurity","author":"olcott","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5523-2_7"},{"key":"ref1","article-title":"Hacktivism: A Defender&#x2019;s Playbook","year":"2016"},{"key":"ref20","article-title":"European Cyber Security Organisation","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"ref21","article-title":"National Institute of Standards and Technology","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-855-0.ch001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref26","first-page":"1","article-title":"On Cyberwarfare","author":"schreier","year":"2012","journal-title":"DCAF Horizon Working Paper"},{"key":"ref25","author":"vacca","year":"2017","journal-title":"Computer and Information Security Handbook"}],"event":{"name":"2018 International Conference on Intelligent Systems (IS)","location":"Funchal - Madeira, Portugal","start":{"date-parts":[[2018,9,25]]},"end":{"date-parts":[[2018,9,27]]}},"container-title":["2018 International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703185\/8710451\/08710531.pdf?arnumber=8710531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:33:01Z","timestamp":1558985581000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8710531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/is.2018.8710531","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}