{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T05:10:58Z","timestamp":1778217058300,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1850054"],"award-info":[{"award-number":["1850054"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450320","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"305-307","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["IIoT-ARAS"],"prefix":"10.1145","author":[{"given":"Bassam","family":"Zahran","sequence":"first","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"given":"Adamu","family":"Hussaini","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"given":"Aisha","family":"Ali-Gombe","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA470450"},{"key":"e_1_3_2_2_2_1","unstructured":"\"Guidelines for Security and Privacy in Internet of Things\" ISO\/IEC 27030 https:\/\/www.iso27001security.com\/html\/27030.html  \"Guidelines for Security and Privacy in Internet of Things\" ISO\/IEC 27030 https:\/\/www.iso27001security.com\/html\/27030.html"},{"key":"e_1_3_2_2_3_1","volume-title":"The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)","author":"Zahran Bassam","year":"2019","unstructured":"Zahran , Bassam , Stacy Nicholson , and Aisha Ali-gombe. \" Cross-Platform Malware : Study of the Forthcoming Hazard Adaptation and Behavior.\" Proceedings of the International Conference on Security and Management (SAM) . The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) , 2019 . Zahran, Bassam, Stacy Nicholson, and Aisha Ali-gombe. \"Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior.\" Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2019."},{"key":"e_1_3_2_2_4_1","volume-title":"OT Security Best Practices","author":"Conto Ruggero","year":"2018","unstructured":"Conto , Ruggero , and Lawrence Orans . OT Security Best Practices , 14 Sept. 2018 , www.gartner.com\/doc\/reprints?id=1--242JE25A Conto, Ruggero, and Lawrence Orans. OT Security Best Practices, 14 Sept. 2018, www.gartner.com\/doc\/reprints?id=1--242JE25A"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450320"}},"subtitle":["IIoT\/ICS Automated Risk Assessment System for Prediction and Prevention"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":4,"alternative-id":["10.1145\/3422337.3450320","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450320","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}