{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:58:28Z","timestamp":1774601908480,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union?s Horizon 2020 research and innovation programme","award":["883273"],"award-info":[{"award-number":["883273"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503823.3503885","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T22:15:51Z","timestamp":1645568151000},"page":"334-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures"],"prefix":"10.1145","author":[{"given":"Shareeful","family":"Islam","sequence":"first","affiliation":[{"name":"School of Computing &amp; Information Science, Faculty of Science and Engineering, Anglia Ruskin University, United Kingdom"}]},{"given":"Spyridon","family":"Papastergiou","sequence":"additional","affiliation":[{"name":"University of Pireaus, Greece"}]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[{"name":"University of Essex, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The State of Cybersecurity in Healthcare Organizations","author":"Ponemon Institute","year":"2018","unstructured":"Ponemon Institute ( 2018 ), The State of Cybersecurity in Healthcare Organizations in 2018, https:\/\/ponemonsullivanreport com\/2018\/03\/the-state-of-cybersecurity-in-healthcare-organizations-in-2018\/ Ponemon Institute (2018), The State of Cybersecurity in Healthcare Organizations in 2018, https:\/\/ponemonsullivanreport com\/2018\/03\/the-state-of-cybersecurity-in-healthcare-organizations-in-2018\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Increasing Threats Require Increased Capabilities","author":"KPMG","year":"2015","unstructured":"KPMG ( 2015 ), Health Care and Cyber Security , Increasing Threats Require Increased Capabilities KPMG (2015), Health Care and Cyber Security, Increasing Threats Require Increased Capabilities"},{"key":"e_1_3_2_1_3_1","volume-title":"Review: Healthcare Under Attack, 2018","author":"Smith D.","year":"2018","unstructured":"Smith , D. , In Review: Healthcare Under Attack, 2018 , https:\/\/blog.radware.com\/security\/applicationsecurity\/ 2018 \/12\/2018-in-review-healthcare-under-attack\/ Smith, D., In Review: Healthcare Under Attack, 2018, https:\/\/blog.radware.com\/security\/applicationsecurity\/2018\/12\/2018-in-review-healthcare-under-attack\/"},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/www.fda.gov\/medical-devices\/safety-communications\/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals  https:\/\/www.fda.gov\/medical-devices\/safety-communications\/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991094"},{"key":"e_1_3_2_1_6_1","unstructured":"Rios B. Butts J. Security Evaluation of the Implantable Cardiac Device Ecosystem Architecture and Implementation Interdependencies 2017 https:\/\/www.ledecodeur.ch\/wp-content\/uploads\/2017\/05\/Pacemaker-Ecosystem-Evaluation.pdf  Rios B. Butts J. Security Evaluation of the Implantable Cardiac Device Ecosystem Architecture and Implementation Interdependencies 2017 https:\/\/www.ledecodeur.ch\/wp-content\/uploads\/2017\/05\/Pacemaker-Ecosystem-Evaluation.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"ISE Report on Securing Hospitals https:\/\/securityevaluators.com\/hospitalhack\/  ISE Report on Securing Hospitals https:\/\/securityevaluators.com\/hospitalhack\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2296271"},{"key":"e_1_3_2_1_9_1","volume-title":"Human-In-The-Loop Approach to Understanding Situation Awareness in Cyber Defense Analysis. EAI Endorsed Transactions on Security and Safety","author":"Tyworth","year":"2013","unstructured":"Tyworth 2013, Tyworth , M. , Giacobe N. , Mancuso V. , McNeese M. , Hall , L. D. , Human-In-The-Loop Approach to Understanding Situation Awareness in Cyber Defense Analysis. EAI Endorsed Transactions on Security and Safety 2013 . Tyworth 2013, Tyworth, M., Giacobe N., Mancuso V. , McNeese M. , Hall, L. D., Human-In-The-Loop Approach to Understanding Situation Awareness in Cyber Defense Analysis. EAI Endorsed Transactions on Security and Safety 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"Informatica , Vol 39(1)","author":"Bo Liu","year":"2015","unstructured":"Bo Liu , Mei Cai and Jiazong Yu , Swarm Intelligence and its Application in Abnormal Data Detection , Informatica , Vol 39(1) , 2015 Bo Liu, Mei Cai and Jiazong Yu , Swarm Intelligence and its Application in Abnormal Data Detection, Informatica , Vol 39(1), 2015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ayyaz-Ul-Haq Qureshi Hadi Larijani Abbas Javed Nhamoinesu Mtetwa Jawad Ahmad Intrusion Detection Using Swarm Intelligence China Emerging Technologies (UCET) 2019  Ayyaz-Ul-Haq Qureshi Hadi Larijani Abbas Javed Nhamoinesu Mtetwa Jawad Ahmad Intrusion Detection Using Swarm Intelligence China Emerging Technologies (UCET) 2019","DOI":"10.1109\/UCET.2019.8881840"},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE Symposium on Computational Intelligence in Cyber Security,2009","author":"Eric M.","unstructured":"Eric M. Holloway and Gary B. Lamont and Gilbert L. Peterson , Network Security Using Self Organized Multi Agent Swarms , IEEE Symposium on Computational Intelligence in Cyber Security,2009 Eric M. Holloway and Gary B. Lamont and Gilbert L. Peterson , Network Security Using Self Organized Multi Agent Swarms, IEEE Symposium on Computational Intelligence in Cyber Security,2009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/370449"},{"key":"e_1_3_2_1_15_1","volume-title":"A general modeling framework for swarms, \u00a02008 IEEE Congress on Evolutionary Computation","author":"Jelmer van Ast","unstructured":"Jelmer van Ast ;\u00a0Robert Babuska;\u00a0Bart De Schutter , A general modeling framework for swarms, \u00a02008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) Jelmer van Ast;\u00a0Robert Babuska;\u00a0Bart De Schutter , A general modeling framework for swarms, \u00a02008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)"},{"key":"e_1_3_2_1_16_1","unstructured":"L. Rosenberg G. Willcox Artificial Swarm Intelligence Unanimous AI  L. Rosenberg G. Willcox Artificial Swarm Intelligence Unanimous AI"}],"event":{"name":"PCI 2021: 25th Pan-Hellenic Conference on Informatics","location":"Volos Greece","acronym":"PCI 2021"},"container-title":["25th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503823.3503885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:31Z","timestamp":1750188631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":15,"alternative-id":["10.1145\/3503823.3503885","10.1145\/3503823"],"URL":"https:\/\/doi.org\/10.1145\/3503823.3503885","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}