{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:44:49Z","timestamp":1766472289482,"version":"3.48.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.23919\/cnsm67658.2025.11297409","type":"proceedings-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:10Z","timestamp":1766428810000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Audit Compliance and Forensics Frameworks for Complex, Large-Scale ICT Systems"],"prefix":"10.23919","author":[{"given":"Jo\u00e3o","family":"Henriques","sequence":"first","affiliation":[{"name":"University of Coimbra, DEI, CISUC,Coimbra,Portugal"}]},{"given":"Filipe","family":"Caldeira","sequence":"additional","affiliation":[{"name":"University of Coimbra, DEI, CISUC,Coimbra,Portugal"}]},{"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[{"name":"University of Coimbra, DEI, CISUC,Coimbra,Portugal"}]},{"given":"Paulo","family":"Sim\u00f5es","sequence":"additional","affiliation":[{"name":"University of Coimbra, DEI, CISUC,Coimbra,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3348552"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100613"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100613"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071164"},{"key":"ref5","first-page":"208","article-title":"On the use of ontology data for protecting critical infrastructures","volume-title":"Proceedings of the 17th European Conference on Cyber Warfare and Security","author":"Henriques"},{"issue":"4","key":"ref6","first-page":"38","article-title":"On the use of ontology data for protecting critical infrastructures","volume":"17","author":"Henriques","year":"2018","journal-title":"Journal of Information Warfare"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102949"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.033"},{"journal-title":"IEC 62443 - IEC Tech Specification - Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models","year":"2017","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"volume-title":"NASA HTTP","year":"2018","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-013"},{"volume-title":"Zero-touch network and service management (ZSM); reference architecture","year":"2019","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2910-2.ch004"},{"key":"ref16","first-page":"380","article-title":"An evolved security architecture for distributed industrial automation and control systems","volume-title":"European Conference on Cyber Warfare and Security. Academic Conferences International Limited","author":"Rosa"}],"event":{"name":"2025 21st International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2025,10,27]]},"location":"Bologna, Italy","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 21st International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11297200\/11297407\/11297409.pdf?arnumber=11297409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:40:22Z","timestamp":1766472022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11297409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cnsm67658.2025.11297409","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}