{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:36:42Z","timestamp":1766428602022,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/isc2.2016.7580754","type":"proceedings-article","created":{"date-parts":[[2016,10,3]],"date-time":"2016-10-03T21:28:20Z","timestamp":1475530100000},"page":"1-6","source":"Crossref","is-referenced-by-count":22,"title":["Forensic readiness of smart buildings: Preconditions for subsequent cybersecurity tests"],"prefix":"10.1109","author":[{"given":"Edita","family":"Bajramovic","sequence":"first","affiliation":[]},{"given":"Karl","family":"Waedt","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ciriello","sequence":"additional","affiliation":[]},{"given":"Deeksha","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEC 62988 [Draft] - NPPs - I&C sys imp to safety - Selection and use of wireless devices","year":"2016","key":"ref31"},{"journal-title":"ISO\/IEC 27034&#x2013;2 - Information technology - Security techniques - Application security - Org normative framework","year":"2015","key":"ref30"},{"journal-title":"ISO\/IEC 27041 - Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative methods","year":"2015","key":"ref10"},{"journal-title":"IEC 62645 - NPPs - I&C - Requirements for Security Programmes for Computer-based Sys","year":"2014","key":"ref11"},{"journal-title":"International Telecommunication Union United Nations","article-title":"Cybersecurity, data protection and cyber resilience in smart sustainable cities","year":"2015","key":"ref12"},{"journal-title":"The Internet of Things How Smart TVs Smart Cars Smart Homes and Smart Cities are Changing the World","year":"2015","author":"miller","key":"ref13"},{"key":"ref14","article-title":"Cybersecurity in Smart Buildings","author":"khaund","year":"2015","journal-title":"A Frost & Sullivan Collaborative Industry Perspective"},{"journal-title":"Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT) Monitor Homeland Security","year":"2015","key":"ref15"},{"key":"ref16","first-page":"172","article-title":"Digital forensic readiness processes and procedures for investigators","volume":"4","author":"veinter","year":"2014","journal-title":"Digital Evidence and Forensic Readiness Dagstuhl Report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-804454-4.00002-2"},{"key":"ref18","article-title":"Digital evidence, digital investigations and e-disclosure: A guide to forensic readiness for organizations, security advisers and lawyers","author":"sommer","year":"2012","journal-title":"Information Assurance Advisory Council"},{"key":"ref19","article-title":"Sufficiency of Windows event log as evidence in digital forensics","author":"al-nemrat","year":"2012","journal-title":"University of East London London"},{"article-title":"Asset Management as a Precondition for Knowledge Management","year":"2016","author":"waedt","key":"ref28"},{"key":"ref4","article-title":"Domain Specific Cybersecurity Applied to I&C","author":"waedt","year":"2015","journal-title":"IAEA Internat Conf on Computer Security in a Nuclear World Vienna"},{"key":"ref27","article-title":"Current computer forensics tools","author":"nelson","year":"2010","journal-title":"Guide to Computer Forensics and Investigations"},{"journal-title":"ISO\/IEC 27043 - Information technology - Security techniques - Incident investigation principles and processes","year":"2015","key":"ref3"},{"journal-title":"ISO\/IEC 27042 - Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence","year":"2015","key":"ref6"},{"journal-title":"ISO 999 1996 - Information and Documentation - Guidelines for the content organization and presentation of indexes","year":"0","key":"ref29"},{"journal-title":"Smart cities start with smart buildings Harward Business Review","year":"2016","key":"ref5"},{"key":"ref8","article-title":"Audit log security: How to monitor and protect audit logs","author":"pascucci","year":"2013","journal-title":"TechTarget SearchSecurity"},{"key":"ref7","article-title":"Hacking smart cities","author":"cerrudo","year":"2015","journal-title":"RSA Conference"},{"key":"ref2","first-page":"1","article-title":"A ten step process for forensic readiness","volume":"2","author":"rowlingson","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1201\/b13689","article-title":"Incident response (Otting)","author":"gogolin","year":"2012","journal-title":"Digital forensics explained"},{"key":"ref1","article-title":"Forensics readiness","author":"tan","year":"2001","journal-title":"Technical Cambridge USA"},{"key":"ref20","first-page":"21","article-title":"Forensic analysis","author":"casey","year":"2009","journal-title":"Handbook of Digital Forensics and Investigation"},{"journal-title":"ISO\/IEC 27035 (all three parts) - Information technology - Security techniques - Information security incident management","year":"2011","key":"ref22"},{"journal-title":"ISO\/IEC 27037 - Information technology - Security techniques - Guidelines for identification collection acquisition and preservation of digital evidence","year":"2012","key":"ref21"},{"key":"ref24","article-title":"Documentation","author":"casey","year":"2011","journal-title":"Digital evidence & computer crime Forensic science computers and the Internet"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"journal-title":"EnCase&#x00AE;","year":"0","key":"ref26"},{"journal-title":"Forensic toolkit","year":"0","key":"ref25"}],"event":{"name":"2016 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2016,9,12]]},"location":"Trento, Italy","end":{"date-parts":[[2016,9,15]]}},"container-title":["2016 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7573871\/7580726\/07580754.pdf?arnumber=7580754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T06:49:33Z","timestamp":1568443773000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7580754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isc2.2016.7580754","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}