{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:22:41Z","timestamp":1740720161306,"version":"3.38.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,24]]},"DOI":"10.1109\/ispec59716.2024.10892598","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:43Z","timestamp":1740595423000},"page":"473-478","source":"Crossref","is-referenced-by-count":0,"title":["Review on Security Requirements for IT-OT Integration in Utility Internet-of-Things (IoT)"],"prefix":"10.1109","author":[{"given":"Mohammad Hasbullah","family":"Mazlan","sequence":"first","affiliation":[{"name":"TNB Research Sdn Bhd,Dept of Transmission &#x0026; Distribution,Kajang,Selangor,Malaysia"}]},{"given":"Farihan","family":"Mohamad","sequence":"additional","affiliation":[{"name":"TNB Research Sdn Bhd,Dept of Transmission &#x0026; Distribution,Kajang,Selangor,Malaysia"}]},{"given":"Mohd Khairun","family":"Nizam Mohd Sarmin","sequence":"additional","affiliation":[{"name":"TNB Research Sdn Bhd,Dept of Transmission &#x0026; Distribution,Kajang,Selangor,Malaysia"}]},{"given":"Ahmad Farid","family":"Jamil","sequence":"additional","affiliation":[{"name":"TNB Distribution Network,Dept of Asset Management,Petaling Jaya,Selangor,Malaysia"}]},{"given":"Adee Zhafri","family":"Ismail","sequence":"additional","affiliation":[{"name":"TNB Distribution Network,Dept of Asset Management,Petaling Jaya,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/pcicon.2017.8188727"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iotm.2019.1907777"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ic3iot.2018.8668159"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2020.9032420"},{"journal-title":"2018. ISO\/IEC 30141:2018 Internet of Things (IoT)- Reference Architecture (1st. ed.). ISO\/IEC Information Technology Task Force (ITTF)","key":"ref5","article-title":"ISO"},{"article-title":"ETSI","volume-title":"ETSI TR 103 375 V1.1.1 - SmartM2M: IoT Standards landscape and future evolutions. European Telecommunications Standards Institute (ETSI)","year":"2016","key":"ref6"},{"journal-title":"Y.440l\/Y.2068 (03\/15) - Functional framework and capabilities of the Internet of things. International Telecommunication Union (ITU)","article-title":"ITU","year":"2015","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/cccs.2018.8586807"},{"key":"ref9","article-title":"The Extended Risk Assessment Form for IT \/ OT Convergence in IACS Security","volume-title":"2021 60th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE)","author":"Kanamaru","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icacci.2014.6968521"},{"journal-title":"ISA99\/IEC 62443 - Industrial Automation and Control Systems Security. International Society of Automation (ISA)","article-title":"ISA","year":"1999","key":"ref11"},{"journal-title":"ISO\/IEC 27000:2018 - Information technology - Security techniques - Information security management systems - Overview and vocabulary. ISO\/IEC","article-title":"ISO","year":"2018","key":"ref12"},{"journal-title":"ISO\/IEC 15408\u20131:2022 - Information security, cybersecurity and privacy protection -Evaluation criteria for IT security - Part 1: Introduction and general model. ISO\/IEC","article-title":"ISO","year":"2018","key":"ref13"},{"article-title":"NIST","volume-title":"Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology (NIST)","year":"2018","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/wf-iot48130.2020.9221392"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icsadl61749.2024.00094"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/icimu49871.2020.9243493"}],"event":{"name":"2024 IEEE Sustainable Power and Energy Conference (iSPEC)","start":{"date-parts":[[2024,11,24]]},"location":"Kuching, Sarawak, Malaysia","end":{"date-parts":[[2024,11,27]]}},"container-title":["2024 IEEE Sustainable Power and Energy Conference (iSPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10892323\/10892368\/10892598.pdf?arnumber=10892598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T09:51:27Z","timestamp":1740649887000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10892598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ispec59716.2024.10892598","relation":{},"subject":[],"published":{"date-parts":[[2024,11,24]]}}}