{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:41:24Z","timestamp":1757313684893,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1109\/saci51354.2021.9465613","type":"proceedings-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T20:24:34Z","timestamp":1625084674000},"page":"245-248","source":"Crossref","is-referenced-by-count":12,"title":["Review of Industry 4.0 Security Challenges"],"prefix":"10.1109","author":[{"given":"Katalin","family":"FERENCZ","sequence":"first","affiliation":[]},{"given":"Jozsef","family":"DOMOKOS","sequence":"additional","affiliation":[]},{"given":"Levente","family":"KOVACS","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119680"},{"article-title":"Zotob PnP worms slam 13 DaimlerChrysler plants","year":"2005","author":"roberts","key":"ref11"},{"key":"ref12","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref14","article-title":"Havex hunts for ICS\/SCADA systems","author":"hentunen","year":"2014","journal-title":"F-secure"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref16","article-title":"Q3 Cyber Threat Intelligence Details a September to Remember","author":"wolff","year":"2020","journal-title":"Sonicwall"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"113","DOI":"10.12700\/APH.17.5.2020.5.6","article-title":"Security Risk Assessment-based Cloud Migration Methodology for Smart Grid OT Services","volume":"17","author":"bojan","year":"2020","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref3","first-page":"69","article-title":"Ipari IoT szolg&#x00E1;ltat&#x00E1;sok &#x00E9;s ny&#x00ED;lt forr&#x00E1;sk&#x00F3;d&#x00FA; rendszerek &#x00E1;ttekint&#x00E9;se","author":"ferencz","year":"2020","journal-title":"Energetika-Elektrotechnika&#x2013; Sz&#x00E1;m&#x00ED;t&#x00E1;stechnika &#x00E9;s Oktat&#x00E1;s Multi-konferencia (2020)"},{"journal-title":"Infrastructure Monitoring 101 The Power to Predict and Prevent","year":"2021","key":"ref6"},{"journal-title":"Asset Discovery and Inventory&#x2014;Fast Dynamic Comprehensive","year":"2021","key":"ref5"},{"journal-title":"IoT Best Practices How Continuous Monitoring and SOC-as-a-Service Secure IoT-Connected Devices","year":"2018","key":"ref8"},{"journal-title":"Qualys VMDR&#x00AE; &#x2014; All-in-One Vulnerability Management Detection and Response","year":"2021","key":"ref7"},{"key":"ref2","article-title":"Securing the Industrial Internet of Things in OT Networks","author":"peters","year":"2018","journal-title":"Fortinet"},{"journal-title":"Practical Internet of Things Security","year":"2016","author":"brian","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","article-title":"Security of smart manufacturing systems","volume":"47","author":"nilufer","year":"2018","journal-title":"Journal of Manufacturing Systems"}],"event":{"name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2021,5,19]]},"location":"Timisoara, Romania","end":{"date-parts":[[2021,5,21]]}},"container-title":["2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9465482\/9465540\/09465613.pdf?arnumber=9465613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:03Z","timestamp":1652197383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9465613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/saci51354.2021.9465613","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]}}}