{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:20Z","timestamp":1750220480806,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3462223.3485597","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:15:37Z","timestamp":1635437737000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security in a Complex Non-deterministic World"],"prefix":"10.1145","author":[{"given":"Joseph James","family":"Salvo","sequence":"first","affiliation":[{"name":"Cognitive Blocks AI Inc., Schenectady, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"volume-title":"Thinking Fast Thinking Slow. Farrar Straus Giroux New York","key":"e_1_3_2_1_1_1","unstructured":"Daniel Kahneman, 2010. Thinking Fast Thinking Slow. Farrar Straus Giroux New York , New York . Daniel Kahneman, 2010. Thinking Fast Thinking Slow. Farrar Straus Giroux New York, New York."},{"volume-title":"The Black Swan","key":"e_1_3_2_1_2_1","unstructured":"Nassim Nicholas Taleb, 2007. The Black Swan . Random House New York , New York . Nassim Nicholas Taleb, 2007. The Black Swan. Random House New York, New York."},{"volume-title":"The World is Flat. Farrar Straus Giroux New York","key":"e_1_3_2_1_3_1","unstructured":"Thomas Friedman, 2005. The World is Flat. Farrar Straus Giroux New York , New York . Thomas Friedman, 2005. The World is Flat. Farrar Straus Giroux New York, New York."},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/home.cern\/science\/computing\/birth-web\/short-history-web  https:\/\/home.cern\/science\/computing\/birth-web\/short-history-web"},{"key":"e_1_3_2_1_5_1","unstructured":"https:\/\/openlearning.mit.edu  https:\/\/openlearning.mit.edu"},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/timesofindia.indiatimes.com\/business\/india-business\/govts-must-accept-what-they-dont-do-well-like-banking\/articleshow\/86410431.cms)  https:\/\/timesofindia.indiatimes.com\/business\/india-business\/govts-must-accept-what-they-dont-do-well-like-banking\/articleshow\/86410431.cms)"},{"key":"e_1_3_2_1_7_1","volume-title":"Justice Department Emotet infected 1.6 million computers globally from","author":"S.","year":"2020","unstructured":"https:\/\/www.technewsworld.com\/story\/Cybercops-Scrub-Botnet-Software-from-Millions-of-Computers-87110.html October 4, 2021 \"According to the U. S. Justice Department Emotet infected 1.6 million computers globally from April 1, 2020 to Jan. 17, 2021\" https:\/\/www.technewsworld.com\/story\/Cybercops-Scrub-Botnet-Software-from-Millions-of-Computers-87110.html October 4, 2021 \"According to the U.S. Justice Department Emotet infected 1.6 million computers globally from April 1, 2020 to Jan. 17, 2021\""},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Anonymous_(hacker_group)  https:\/\/en.wikipedia.org\/wiki\/Anonymous_(hacker_group)"},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/www.nsa.gov\/Cybersecurity\/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC\/  https:\/\/www.nsa.gov\/Cybersecurity\/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC\/"},{"key":"e_1_3_2_1_11_1","unstructured":"https:\/\/www.upguard.com\/blog\/biggest-data-breaches  https:\/\/www.upguard.com\/blog\/biggest-data-breaches"},{"key":"e_1_3_2_1_12_1","unstructured":"Karl Marx 1845. \"The German Ideology\". http:\/\/fs2.american.edu\/dfagel\/www\/Class%20Readings\/Marx\/The%20German%20Ideology.pdf  Karl Marx 1845. \"The German Ideology\". http:\/\/fs2.american.edu\/dfagel\/www\/Class%20Readings\/Marx\/The%20German%20Ideology.pdf"},{"key":"e_1_3_2_1_13_1","unstructured":"https:\/\/quantumzeitgeist.com\/quantum-computing-companies-134-companies\/ Joseph James Salvo Ph.D. is an advisor to Bleximo Corp.  https:\/\/quantumzeitgeist.com\/quantum-computing-companies-134-companies\/ Joseph James Salvo Ph.D. is an advisor to Bleximo Corp."},{"key":"e_1_3_2_1_14_1","unstructured":"https:\/\/www.einnews.com\/pr_news\/527268204\/idq-and-sk-broadband-selected-to-build-a-pilot-qkd-infrastructure-in-public-medical-and-industrial-sectors-in-korea  https:\/\/www.einnews.com\/pr_news\/527268204\/idq-and-sk-broadband-selected-to-build-a-pilot-qkd-infrastructure-in-public-medical-and-industrial-sectors-in-korea"},{"key":"e_1_3_2_1_15_1","unstructured":"https:\/\/physicsworld.com\/a\/beijing-and-vienna-have-a-quantum-conversation\/  https:\/\/physicsworld.com\/a\/beijing-and-vienna-have-a-quantum-conversation\/"},{"key":"e_1_3_2_1_16_1","unstructured":"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8309\/final  https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8309\/final"},{"key":"e_1_3_2_1_17_1","unstructured":"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--207\/final  https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--207\/final"},{"key":"e_1_3_2_1_18_1","unstructured":"https:\/\/xage.com\/blog\/xage-partners-with-the-u-s-space-force-to-introduce-blockchain-protected-zero-trust-cybersecurity-for-space-architecture-resiliency\/  https:\/\/xage.com\/blog\/xage-partners-with-the-u-s-space-force-to-introduce-blockchain-protected-zero-trust-cybersecurity-for-space-architecture-resiliency\/"},{"key":"e_1_3_2_1_19_1","unstructured":"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=8779615  https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=8779615"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:54Z","timestamp":1750193334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485597"}},"subtitle":["Towards a Quantum Secure Industrial Internet \"QSII&amp;\""],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":19,"alternative-id":["10.1145\/3462223.3485597","10.1145\/3462223"],"URL":"https:\/\/doi.org\/10.1145\/3462223.3485597","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}