{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:52:39Z","timestamp":1730260359314,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icufn.2018.8436591","type":"proceedings-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T22:04:56Z","timestamp":1534457096000},"page":"837-842","source":"Crossref","is-referenced-by-count":1,"title":["Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System"],"prefix":"10.1109","author":[{"given":"Minhee","family":"Joo","sequence":"first","affiliation":[]},{"given":"Junwoo","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Junhyoung","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Mookyu","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0749-3797(00)00146-X"},{"journal-title":"Aws honeypots marx geo","year":"2013","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"journal-title":"Creating defensible space","year":"1997","author":"newman","key":"ref3"},{"key":"ref6","first-page":"67","article-title":"An introduction to factor analysis of information risk (fair)","volume":"2","author":"jones","year":"2006","journal-title":"Norwich Journal of Information Assurance"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"journal-title":"Fixing broken windows restoring order and reducing crime in our communities","year":"1997","author":"kelling","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2016.09.016"},{"key":"ref2","first-page":"8","article-title":"Recent trends in cyber physical systems research","volume":"31","author":"eun","year":"2013","journal-title":"Communications of the Korean Institute of Information Scientists and Engineers"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2013.6578215"}],"event":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2018,7,3]]},"location":"Prague","end":{"date-parts":[[2018,7,6]]}},"container-title":["2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8417133\/8436587\/08436591.pdf?arnumber=8436591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:45:38Z","timestamp":1643197538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8436591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icufn.2018.8436591","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}