{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:37:01Z","timestamp":1773416221188,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,20]]},"DOI":"10.23919\/cisti58278.2023.10211415","type":"proceedings-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T17:25:32Z","timestamp":1692120332000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["IT\/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems"],"prefix":"10.23919","author":[{"given":"Silvino","family":"Santos","sequence":"first","affiliation":[{"name":"Escola Superior de Tecnologia e Gest&#x00E3;o- Instituto Polit&#x00E9;cnico de Viana do Castel&#x00F3;,Viana do Castelo,Portugal"}]},{"given":"Paulo","family":"Costa","sequence":"additional","affiliation":[{"name":"Escola Superior de Tecnologia e Gest&#x00E3;o- Instituto Polit&#x00E9;cnico de Viana do Castel&#x00F3;,Research Center for Systems and Technologies (SYSTEC), ARISE,Porto,Portugal"}]},{"given":"Agostinho","family":"Rocha","sequence":"additional","affiliation":[{"name":"Faculdade de Engenharia - Universidade do Port&#x00F3;,Research Center for Systems and Technologies (SYSTEC), ARISE,Porto,Portugal"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The convergence of IT and OT in critical infrastructure","volume-title":"Aust. Inf. Secur. Manag. Conf","author":"Murray"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21279\/1454-864x-20-i1-027"},{"key":"ref3","article-title":"Cyber-weapons in International Politics: Possible sabotage against the Norwegian petroleum sector","author":"Friis","year":"2018","journal-title":"NUPI Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1477076"},{"key":"ref5","article-title":"Global Cybersecurity Outlook 2022","volume-title":"World Economic Forum","year":"2022"},{"issue":"1","key":"ref6","first-page":"192","article-title":"Taxonomy of Malware: Virus, Worms and Trojan","volume":"6","author":"Kaur","year":"2019","journal-title":"Int J Res Anal Rev"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.103165"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3899370"},{"key":"ref9","first-page":"18","article-title":"Five months before DarkSide attacked the Colonial pipeline, two researchers discovered a way to rescue its ransomware victims. Then an antivirus company\u2019s announcement alerted the hackers","author":"Dudley"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2021.110122"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/03611981211041604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33564\/ijeast.2022.v07i06.047"},{"key":"ref13","first-page":"18","article-title":"Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions","author":"Shalamanov","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(18)30077-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9142967"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2020.104044"},{"key":"ref17","article-title":"Socio-Technical Root Cause Analysis of Cyberenabled Theft of the U.S. Intellectual Property \u2013 The Case of APT41","author":"Kianpour","year":"2021","journal-title":"ArXiv210304901 Cs"},{"key":"ref18","article-title":"Cyber Security\u2019s New Challenges Under Covid-19 Pandemic: Between Technique and Law","author":"Corina","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.102217"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.58960\/rbi.2018.13.154"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s22020454"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/10439862211001628"},{"issue":"10","key":"ref24","article-title":"Security in Industry 4.0: Cyber-attacks and countermeasures","volume":"12","author":"Naanani","year":"2021","journal-title":"Turk. J. Comput. Math. Educ. TURCOMAT"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90370-1_19"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116198"},{"key":"ref28","first-page":"4","article-title":"Penetration Testing and Vulnerability Assessment","author":"Kanunje"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051633"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3474553"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1108\/ijoa-01-2021-2598"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2022.152002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/htl2.12008"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.33736\/jita.3402.2021"},{"key":"ref36","first-page":"10","article-title":"A Case Study of Cloud-Based Business Continuity Model","author":"Kutame"},{"key":"ref37","article-title":"Log4j \u2013 Apache Log4j Security Vulnerabilities","year":"2022"},{"key":"ref39","first-page":"5","article-title":"Investigating Usable Indicators against Cyber-Attacks in Industrial Control Systems","author":"Asiri"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s21093267"}],"event":{"name":"2023 18th Iberian Conference on Information Systems and Technologies (CISTI)","location":"Aveiro, Portugal","start":{"date-parts":[[2023,6,20]]},"end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 18th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10210744\/10211252\/10211415.pdf?arnumber=10211415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:09:24Z","timestamp":1705021764000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10211415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,20]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/cisti58278.2023.10211415","relation":{},"subject":[],"published":{"date-parts":[[2023,6,20]]}}}