{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:19:43Z","timestamp":1766578783593,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/nca57778.2022.10013559","type":"proceedings-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:28:06Z","timestamp":1673897286000},"page":"1-7","source":"Crossref","is-referenced-by-count":14,"title":["A Zero Trust approach for the cybersecurity of Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"Claudio","family":"Zanasi","sequence":"first","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Federico","family":"Magnanini","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia,Department of Engineering \"Enzo Ferrari\""}]},{"given":"Silvio","family":"Russo","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]}],"member":"263","reference":[{"key":"ref1","first-page":"102911","article-title":"An analysis of zero-trust architecture and its cost-effectiveness for organizational security","volume-title":"Computers Security","volume":"122","author":"Adahman","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.272"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i1.pp611-619"},{"volume-title":"Known exploited vulnerabilities catalog","key":"ref4"},{"author":"Perez","key":"ref5","article-title":"Check your pulse: Suspected apt actors leverage authentication bypass techniques and pulse secure zero-day"},{"author":"Perez","key":"ref6","article-title":"Re-checking your pulse: Updates on chinese apt actors compromising pulse secure vpn devices"},{"key":"ref7","article-title":"Director","volume-title":"Moving the u.s. government toward zero trust cybersecurity principles","author":"A","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITOEC53115.2022.9734455"},{"volume-title":"Flask project","year":"2022","key":"ref9"},{"journal-title":"INTERNATIONAL ELECTROTECHNICAL COMMISSION, Standard","key":"ref10","article-title":"IEC\/TS 62443 Industrial communication networks \u2013 Network and system security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2017.8078963"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2018.8812486"},{"volume-title":"It ot convergence, managing the cybersecurity risks","author":"Katuruza","key":"ref13"},{"key":"ref14","article-title":"No more chewy centers: The zero trust model of information security","volume":"23","author":"Kindervag","year":"2016","journal-title":"Forrester Research, Inc., dated Mar"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-94029-4_13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73689-7_68"},{"article-title":"The convergence of IT and OT in critical infrastructure","year":"2017","author":"Murray","key":"ref17"},{"volume-title":"Iptables","key":"ref18"},{"key":"ref19","article-title":"National vulnerability database"},{"volume-title":"Remote os detection","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3351882"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"author":"Tyler Mclellan","key":"ref24","article-title":"Unc2447 sombrat and fivehands ransomware: A sophisticated financial threat"},{"issue":"6","key":"ref25","first-page":"6","article-title":"Beyondcorp: A new approach to enterprise security","volume":"39","author":"Ward","year":"2014"},{"volume-title":"Vpn risk report","year":"2021","key":"ref26"}],"event":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2022,12,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10013484\/10013503\/10013559.pdf?arnumber=10013559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T04:55:22Z","timestamp":1712811322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/nca57778.2022.10013559","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}