{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:18Z","timestamp":1750220958261,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission H2020","award":["GA #786727"],"award-info":[{"award-number":["GA #786727"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,12]]},"DOI":"10.1145\/3297662.3365787","type":"proceedings-article","created":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T06:07:56Z","timestamp":1578722876000},"page":"262-269","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Big Data Platform for Integrated Cyber and Physical Security of Critical Infrastructures for the Financial Sector"],"prefix":"10.1145","author":[{"given":"Ernesto","family":"Troiano","sequence":"first","affiliation":[{"name":"European Projects, GFT Italia Srl, Genova Italy"}]},{"given":"John","family":"Soldatos","sequence":"additional","affiliation":[{"name":"Research and Development, Innov-Acts Ltd, Nicosia Cyprus"}]},{"given":"Ariana","family":"Polyviou","sequence":"additional","affiliation":[{"name":"Department of Management and MIS University of Nicosia, Nicosia Cyprus"}]},{"given":"Andreas","family":"Polyviou","sequence":"additional","affiliation":[{"name":"Research and Development, Innov-Acts Ltd, Nicosia Cyprus"}]},{"given":"Alessandro","family":"Mamelli","sequence":"additional","affiliation":[{"name":"Pointnext Advisory &amp; Professional Services, Hewlett-Packard Italiana, Srl Cernusco s\/N, Milan, Italy"}]},{"given":"Dimitris","family":"Drakoulis","sequence":"additional","affiliation":[{"name":"Research and Development, Innov-Acts Ltd, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2020,1,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"494","volume-title":"Integrating physical and cyber security resources to detect wireless threats to critical infrastructure,\" 2011 IEEE International Conference on Technologies for Homeland Security (HST)","author":"D'Amico A.","year":"2011","unstructured":"A. D'Amico , C. Verderosa , C. Horn and T. Imhof , \" Integrating physical and cyber security resources to detect wireless threats to critical infrastructure,\" 2011 IEEE International Conference on Technologies for Homeland Security (HST) , Waltham, MA , 2011 , pp. 494 -- 500 . doi: 10.1109\/THS.2011.6107918 10.1109\/THS.2011.6107918 A. D'Amico, C. Verderosa, C. Horn and T. Imhof, \"Integrating physical and cyber security resources to detect wireless threats to critical infrastructure,\" 2011 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, 2011, pp. 494--500. doi: 10.1109\/THS.2011.6107918"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840183"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Cyber\/physical security vulnerability assessment integration,\" 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT)","author":"MacDonald D.","year":"2013","unstructured":"D. MacDonald , \" Cyber\/physical security vulnerability assessment integration,\" 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT) , Washington, DC , 2013 , pp. 1 -- 6 ., doi: 10.1109\/ISGT.2013.6497883 10.1109\/ISGT.2013.6497883 D. MacDonald et al., \"Cyber\/physical security vulnerability assessment integration,\" 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, 2013, pp. 1--6., doi: 10.1109\/ISGT.2013.6497883"},{"key":"e_1_3_2_1_5_1","first-page":"589","volume-title":"Cyber Physical System Integration and Configuration Guided by Satisfiability Modulo Theories,\" 2015 IEEE International Conference on Information Reuse and Integration","author":"Pochiraju K.","year":"2015","unstructured":"K. Pochiraju and S. Narain , \" Cyber Physical System Integration and Configuration Guided by Satisfiability Modulo Theories,\" 2015 IEEE International Conference on Information Reuse and Integration , San Francisco, CA , 2015 , pp. 589 -- 592 . doi: 10.1109\/IRI.2015.93 10.1109\/IRI.2015.93 K. Pochiraju and S. Narain, \"Cyber Physical System Integration and Configuration Guided by Satisfiability Modulo Theories,\" 2015 IEEE International Conference on Information Reuse and Integration, San Francisco, CA, 2015, pp. 589--592. doi: 10.1109\/IRI.2015.93"},{"key":"e_1_3_2_1_6_1","first-page":"484","volume-title":"St. Petersburg","author":"Kotenko I. V.","year":"2016","unstructured":"I. V. Kotenko , D. S. Levshun and A. A. Chechulin , \" Event correlation in the integrated cyber-physical security system,\" 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) , St. Petersburg , 2016 , pp. 484 -- 486 . doi: 10.1109\/SCM.2016.7519820 10.1109\/SCM.2016.7519820 I. V. Kotenko, D. S. Levshun and A. A. Chechulin, \"Event correlation in the integrated cyber-physical security system,\" 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, 2016, pp. 484--486. doi: 10.1109\/SCM.2016.7519820"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"e_1_3_2_1_8_1","first-page":"20170131","article-title":"The Industrial Internet of Thing Volume G1: Reference Architecture","volume":"80","author":"Industrial Internet Consortium","year":"2017","unstructured":"Industrial Internet Consortium , \" The Industrial Internet of Thing Volume G1: Reference Architecture \", IIC:PUB:G1:V1 . 80 : 20170131 , 2017 . Industrial Internet Consortium, \"The Industrial Internet of Thing Volume G1: Reference Architecture\", IIC:PUB:G1:V1.80:20170131, 2017.","journal-title":"IIC:PUB:G1:V1"},{"key":"e_1_3_2_1_9_1","unstructured":"OASIS Cyber Threat Intelligence (CTI) Technical Committee \"Structured Threat Information Expression (STIX\u2122)\" available at: https:\/\/linproxy.fan.workers.dev:443\/https\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=cti  OASIS Cyber Threat Intelligence (CTI) Technical Committee \"Structured Threat Information Expression (STIX\u2122)\" available at: https:\/\/linproxy.fan.workers.dev:443\/https\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=cti"},{"key":"e_1_3_2_1_10_1","unstructured":"SkyDive https:\/\/linproxy.fan.workers.dev:443\/http\/skydive.network\/  SkyDive https:\/\/linproxy.fan.workers.dev:443\/http\/skydive.network\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Elastic Beats https:\/\/linproxy.fan.workers.dev:443\/https\/www.elastic.co\/products\/beats  Elastic Beats https:\/\/linproxy.fan.workers.dev:443\/https\/www.elastic.co\/products\/beats"}],"event":{"name":"MEDES '19: 11th International Conference on Management of Digital EcoSystems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"MEDES '19"},"container-title":["Proceedings of the 11th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3297662.3365787","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3297662.3365787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:09Z","timestamp":1750204449000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3297662.3365787"}},"subtitle":["Critical Infrastructures as Cyber-Physical Systems"],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":11,"alternative-id":["10.1145\/3297662.3365787","10.1145\/3297662"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3297662.3365787","relation":{},"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"2020-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}