{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:45:58Z","timestamp":1761129958254},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624688","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T23:55:42Z","timestamp":1638316542000},"source":"Crossref","is-referenced-by-count":16,"title":["Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase"],"prefix":"10.1109","author":[{"given":"Sai Sree Laya","family":"Chukkapalli","sequence":"first","affiliation":[]},{"given":"Nisha","family":"Pillai","sequence":"additional","affiliation":[]},{"given":"Sudip","family":"Mittal","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05755-8_41"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3162383"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3070843"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/ICMIRA.2013.45","article-title":"Data mining: Data mining concepts and techniques","author":"agarwal","year":"2013","journal-title":"2013 International Conference on Machine Intelligence and Research Advancement"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2021.3073396"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560683"},{"key":"ref10","year":"0","journal-title":"Resource Description Framework"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3445969.3450429"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2012.2185509"},{"key":"ref14","first-page":"49","article-title":"Smart farming system using sensors for agricultural task automation","author":"jagannathan","year":"2015","journal-title":"2015 IEEE Technological Innovation in ICT for Agriculture and Rural Development (TIAR)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2015.7045722"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP.2013.6707647"},{"key":"ref17","year":"0","journal-title":"Five Use Cases for Digital Twins in Manufacturing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051158"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00054"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2020.9105926"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931361"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975142"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1443229"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3343519"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER.2015.7288129"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377832"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022763"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA.2018.8597264"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC46095.2019.9033075"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"key":"ref21","year":"0","journal-title":"SPARQL Query Language"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718501"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3233\/SW-140134"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-05778-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3233\/SW-160218"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"San Antonio, TX, USA","start":{"date-parts":[[2021,11,2]]},"end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624688.pdf?arnumber=9624688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:49Z","timestamp":1652201629000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624688","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}