{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T22:31:21Z","timestamp":1774909881389,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,10]]},"DOI":"10.1145\/3725899.3725920","type":"proceedings-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T11:33:04Z","timestamp":1752233584000},"page":"137-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Segmentation Security with the Implementation of Threats"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1913-7907","authenticated-orcid":false,"given":"Ryan","family":"Bredesen","sequence":"first","affiliation":[{"name":"Department of Technology, Illinois State University, Normal, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8571-2183","authenticated-orcid":false,"given":"Stephen","family":"Mujeye","sequence":"additional","affiliation":[{"name":"Department of Technology, Illinois State University, Normal, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,11]]},"reference":[{"issue":"2","key":"e_1_3_3_1_1_2","first-page":"90","article-title":"The effect of cybercrime on Romanian SMEs in the context of Wannacry ransomware attacks","volume":"14","author":"Ioanid A.","year":"2019","unstructured":"Ioanid, A., Scarlat, C., & Militaru, G. (2019). The effect of cybercrime on Romanian SMEs in the context of Wannacry ransomware attacks. Romanian Journal of Cybersecurity, 14(2), 90-105.","journal-title":"Romanian Journal of Cybersecurity"},{"issue":"6","key":"e_1_3_3_1_2_2","first-page":"195","article-title":"Network segmentation strategies - defense-in-depth approach: Exploring network segmentation strategies as part of a defense-in-depth approach to minimize the impact of cyber attacks and prevent lateral movement","volume":"5","author":"Papadopoulos A.","year":"2022","unstructured":"Papadopoulos, A. (2022). Network segmentation strategies - defense-in-depth approach: Exploring network segmentation strategies as part of a defense-in-depth approach to minimize the impact of cyber attacks and prevent lateral movement. Cybersecurity Strategies in Practice, 5(6), 195-210.","journal-title":"Cybersecurity Strategies in Practice"},{"issue":"3","key":"e_1_3_3_1_3_2","first-page":"145","article-title":"An overview of secure network segmentation in connected IIoT environments","volume":"12","author":"Baligodugula V. V.","year":"2024","unstructured":"Baligodugula, V. V., Ghimire, A., & Amsaad, F. (2024). An overview of secure network segmentation in connected IIoT environments. Journal of Industrial Cybersecurity, 12(3), 145-159.","journal-title":"Journal of Industrial Cybersecurity"},{"key":"e_1_3_3_1_4_2","volume-title":"5G network slice isolation. 5G Networks and Security, 17(2), 280-295","author":"Wong S.","year":"2022","unstructured":"Wong, S., Han, B., & Schotten, H. D. (2022). 5G network slice isolation. 5G Networks and Security, 17(2), 280-295."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1349"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.47363\/JEAST\/2023(5)269"},{"key":"e_1_3_3_1_7_2","unstructured":"Dashlane. (2024 February 19). What is network segmentation & how does it work? Dashlane Blog. https:\/\/www.dashlane.com\/blog\/what-is-network-segmentation."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102162"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0031-z"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.010"},{"issue":"3","key":"e_1_3_3_1_11_2","first-page":"170","article-title":"Security control of unstructured data in the Power IoT for isolation between internal and external networks","volume":"9","author":"Yang R.","year":"2022","unstructured":"Yang, R., Wang, D., & Liang, F. (2022). Security control of unstructured data in the Power IoT for isolation between internal and external networks. Journal of IoT Security, 9(3), 170-188.","journal-title":"Journal of IoT Security"},{"issue":"1","key":"e_1_3_3_1_12_2","first-page":"35","article-title":"A micro-segmentation method based on VLAN-VxLAN mapping mechnology","volume":"11","author":"Li","year":"2024","unstructured":"Li, Di, Zhibang Yang, Siyang Yu, Mingxing Duan, and Shenghong Yang. (2024). A micro-segmentation method based on VLAN-VxLAN mapping mechnology. Journal of Network Security, 11(1), 35-50.","journal-title":"Journal of Network Security"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-021-00143-4"},{"key":"e_1_3_3_1_14_2","unstructured":"Huang Y. Wang J. & Zhang X. (n.d.). Securing virtual networks with isolation and dynamic access control. Journal of Cybersecurity Research 5(2) 87-102."}],"event":{"name":"ICSIM 2025: 2025 The 8th International Conference on Software Engineering and Information Management","location":"Singapore Singapore","acronym":"ICSIM 2025"},"container-title":["Proceedings of the 2025 8th International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3725899.3725920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:34:33Z","timestamp":1752665673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3725899.3725920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":14,"alternative-id":["10.1145\/3725899.3725920","10.1145\/3725899"],"URL":"https:\/\/doi.org\/10.1145\/3725899.3725920","relation":{},"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}