{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:49Z","timestamp":1750309609878,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707851","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"241-242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Cybersecurity Risk Assessment and Visualization Framework for Resilient Cloud IT Asset Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9467-5146","authenticated-orcid":false,"given":"Joonho","family":"Seo","sequence":"first","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8580-6887","authenticated-orcid":false,"given":"Jinmyeong","family":"Shin","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6092-1217","authenticated-orcid":false,"given":"Geon-Woo","family":"Yoon","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7728-2278","authenticated-orcid":false,"given":"Jae-Seok","family":"Kim","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-5082","authenticated-orcid":false,"given":"Yoon-Ho","family":"Choi","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"64","volume-title":"Integration of Cloud Computing with Emerging Technologies","author":"Mehra Sameer","unstructured":"Sameer Mehra, Sapna Sinha, and Vikas Chaudhary. Data breach in cloud computing due to misconfigurations. In Integration of Cloud Computing with Emerging Technologies, pages 55\u201364. CRC Press, 2023."},{"volume-title":"elkjs. https:\/\/github.com\/kieler\/elkjs","year":"2024","key":"e_1_3_2_1_2_1","unstructured":"Kieler. elkjs. https:\/\/github.com\/kieler\/elkjs, 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"Guide for conducting risk assessments","author":"Ross Ronald S","year":"2012","unstructured":"Ronald S Ross. Guide for conducting risk assessments. 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"nmmap. https:\/\/nmap.org\/","author":"Lyon Gordon","year":"2024","unstructured":"Gordon Lyon. nmmap. https:\/\/nmap.org\/, 2024."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/github.com\/koutto\/vulners-lookup","author":"Brun-Nouvion J\u00e9r\u00e9my","year":"2019","unstructured":"J\u00e9r\u00e9my Brun-Nouvion. Vulners-lookup. https:\/\/github.com\/koutto\/vulners-lookup, 2019."},{"key":"e_1_3_2_1_6_1","volume-title":"Vulners database. https:\/\/vulners.com\/","author":"INC.","year":"2024","unstructured":"INC. VULNERS. Vulners database. https:\/\/vulners.com\/, 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"Risk management framework for information systems and organizations: A system life cycle approach for security and privacy","author":"Ross Ronald S","year":"2018","unstructured":"Ronald S Ross. Risk management framework for information systems and organizations: A system life cycle approach for security and privacy. 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Sp 800-53 rev. 3. recommended security controls for federal information systems and organizations","author":"Joint Task Force Transformation Initiative et al.","year":"2009","unstructured":"Joint Task Force Transformation Initiative et al. Sp 800-53 rev. 3. recommended security controls for federal information systems and organizations, 2009."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":8,"alternative-id":["10.1145\/3672608.3707851","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707851","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}