{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:32:12Z","timestamp":1761395532245,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wf-iot.2019.8767279","type":"proceedings-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:04:42Z","timestamp":1563840282000},"page":"70-75","source":"Crossref","is-referenced-by-count":13,"title":["Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)"],"prefix":"10.1109","author":[{"given":"John","family":"O'Raw","sequence":"first","affiliation":[]},{"given":"David","family":"Laverty","sequence":"additional","affiliation":[]},{"given":"D. John","family":"Morrow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SDP Hackathon Whitepaper","year":"2014","key":"ref31"},{"journal-title":"RFC 4226 HOTP An HMAC-Based One-Time Password Algorithm","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771238"},{"journal-title":"B Gates","article-title":"Trustworthy Computing","year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"journal-title":"Attack Trees Dr Dobb's Journal","year":"1999","author":"schneier","key":"ref13"},{"journal-title":"The TREsPASS Project","year":"0","key":"ref14"},{"journal-title":"Secrets of the Little Blue Box R Rosenbaum","year":"0","key":"ref15"},{"journal-title":"Forwarding and control element separation (forces) framework","year":"2004","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741417"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997200"},{"journal-title":"Enabling Network Access for IoT devices from the Cloud","year":"2019","key":"ref28"},{"journal-title":"A Systematic Evaluation of Transient Execution Attacks and Defenses","year":"2018","author":"canell","key":"ref4"},{"year":"0","key":"ref27"},{"journal-title":"Equifax Breach Aftermath Report","year":"2018","key":"ref3"},{"journal-title":"National Academy of Sciences Report","year":"1998","key":"ref6"},{"journal-title":"IEEE Standard for Local and metropolitan area networks Secure Device Identity","year":"0","key":"ref29"},{"journal-title":"Agile vs Structured Distributed Software Development A Case Study","year":"2013","author":"estler","key":"ref5"},{"journal-title":"ISO GUIDE 73 2009","article-title":"Risk management. Vocabulary","year":"0","key":"ref8"},{"journal-title":"ISO\/IEC 15408 2009 Information Technology - Security Techniques - Evaluation Criteria for IT Security","year":"0","key":"ref7"},{"key":"ref2","article-title":"Why We Failed","volume":"5","year":"2018","journal-title":"ISACA Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534521"},{"key":"ref1","article-title":"The Price of a Data Breach","volume":"4","year":"2018","journal-title":"ISACA Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2013.2240920"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2789442"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2017.8274265"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.0836"},{"journal-title":"Unpublished MSc Research Khalid Said Abdullah AL Shereiqi J O&#x2019;Raw 2018","year":"0","key":"ref23"},{"journal-title":"CLOUD SECURITY ALLIANCE SDP Specification 1 0","year":"2014","key":"ref26"},{"journal-title":"Department of Defense Global Information Grid Architectural Vision Vision for a Net-Centric Service-Oriented DoD Enterprise v1 0 June 2007","year":"0","key":"ref25"}],"event":{"name":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19)","start":{"date-parts":[[2019,4,15]]},"location":"Limerick, Ireland","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE 5th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764305\/8767167\/08767279.pdf?arnumber=8767279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:15Z","timestamp":1658094915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8767279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2019.8767279","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}