{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:36:24Z","timestamp":1759091784813},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/isc2.2016.7580812","type":"proceedings-article","created":{"date-parts":[[2016,10,3]],"date-time":"2016-10-03T17:28:20Z","timestamp":1475515700000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Automatic assets identification for smart cities: Prerequisites for cybersecurity risk assessments"],"prefix":"10.1109","author":[{"given":"Karl","family":"Waedt","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Ciriello","sequence":"additional","affiliation":[]},{"given":"Mithil","family":"Parekh","sequence":"additional","affiliation":[]},{"given":"Edita","family":"Bajramovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.54"},{"article-title":"Chipset Level Cybersecurity Issues","year":"0","author":"waedt","key":"ref32"},{"journal-title":"Total Network Inventory 3 2 6","year":"2016","key":"ref31"},{"journal-title":"IT - IT asset management - Overview and vocabulary","year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2517321"},{"key":"ref36","article-title":"A Comparative Study of Software Defined Networking (SDN) solutions with a Proof of Concept","author":"tellabi","year":"2016","journal-title":"Office National des Chemins de Fer (ONCF)"},{"article-title":"High Assurance Cybersecurity Controls against Persistent and Targeted Attacks on I&C Systems in Nuclear Facilities","year":"0","author":"zavarsky","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2525041"},{"key":"ref11","article-title":"Robotic Automated External Defibrillator Abulance for Emergency Medical Service in Smaart Cities","author":"samamni","year":"2016","journal-title":"IEEE Access Special Section on Smart Cities"},{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Information security management systems &#x2014; Requirements","year":"0","key":"ref12"},{"journal-title":"Engineering data exchange format for use in industrial automation systems engineering - Automation markup language - Architecture and general requirements","year":"0","key":"ref13"},{"article-title":"Nuclear Safety and Risk based Cybersecurity Testing","year":"0","author":"waedt","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"article-title":"3D Modeling of Selected Assets, Security Zones and Conduits","year":"0","author":"seibt","key":"ref16"},{"article-title":"Domain Specific Cybersecurity Applied to I&C","year":"0","author":"waedt","key":"ref17"},{"journal-title":"HMG IA Standard No 1 2009 Technical Risk Assessment","year":"0","key":"ref18"},{"article-title":"Cybersecurity Aspects in the I&C Design of NPPs","year":"0","author":"bajramovic","key":"ref19"},{"journal-title":"Information technology - Security techniques - Information security for supplier relationships - Requirements","year":"0","key":"ref28"},{"journal-title":"Asset Management - Overview Principles and Terminology","year":"0","key":"ref4"},{"journal-title":"Security for industrial automation and control systems - Security program requirements for IACS service providers","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238277"},{"journal-title":"NIST Special Publication 1108r3 NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 3 0","year":"2014","key":"ref6"},{"journal-title":"Information technology - Security techniques - Specification for digital redation","year":"0","key":"ref29"},{"journal-title":"Asset Management - Management Systems - Requirements","year":"0","key":"ref5"},{"article-title":"I&C Modeling for Cybersecurity Analyses","year":"0","author":"waedt","key":"ref8"},{"journal-title":"IT Security\/Interoperability 1st Sino-German Intelligent Manufacturing","year":"2015","author":"waedt","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2339817"},{"journal-title":"Adaptive City Mobility (ACM) blazes new paths for competitive electric mobility","year":"2016","author":"leibold","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2538059"},{"article-title":"Graded Security Forensic Readiness of SCADA Systems","year":"0","author":"li","key":"ref20"},{"journal-title":"IT - Security techniques - Application security - Organisation normative framework","year":"0","key":"ref22"},{"journal-title":"IT - Security techniques - Application security - Overview and concepts","year":"0","key":"ref21"},{"journal-title":"IT - Software asset management - Software identification tag","year":"0","key":"ref24"},{"journal-title":"IT - SW asset manage - Processes & tiered assessment of conformance","year":"0","key":"ref23"},{"journal-title":"[Draft] Information technology - Security techniques - Information security for supplier relationships - Guidelines for security of cloud services","year":"0","key":"ref26"},{"journal-title":"Information technology - Security techniques -Information security for supplier relationships - Overview and concepts","year":"0","key":"ref25"}],"event":{"name":"2016 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2016,9,12]]},"location":"Trento, Italy","end":{"date-parts":[[2016,9,15]]}},"container-title":["2016 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7573871\/7580726\/07580812.pdf?arnumber=7580812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:54:43Z","timestamp":1476226483000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7580812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/isc2.2016.7580812","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}