{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:21:35Z","timestamp":1730280095374,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,27]]},"DOI":"10.1109\/iwssip58668.2023.10180290","type":"proceedings-article","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T17:29:52Z","timestamp":1689701392000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A Survey and Risk Assessment on Virtual and Augmented Reality Cyberattacks"],"prefix":"10.1109","author":[{"given":"T\u00e2nia","family":"Silva","sequence":"first","affiliation":[{"name":"ADiT-Lab, Instituto Politécnico de Viana do Castelo,Viana do Castelo,Portugal"}]},{"given":"Sara","family":"Paiva","sequence":"additional","affiliation":[{"name":"ADiT-Lab, Instituto Politécnico de Viana do Castelo,Viana do Castelo,Portugal"}]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[{"name":"ADiT-Lab, Instituto Politécnico de Viana do Castelo,Viana do Castelo,Portugal"}]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"CIICESI, ESTG, Instituto Politécnico do Porto,Portugal"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.295"},{"article-title":"So what exactly is avantis world?","year":"0","author":"blum","key":"ref35"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3121216"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21006-3_21"},{"year":"0","key":"ref15","article-title":"Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651847"},{"year":"0","key":"ref36"},{"article-title":"Challenges and new directions in augmented reality, computer security, and neuroscience – part 1: Risks to sensation and perception","year":"2018","author":"baldassi","key":"ref31"},{"key":"ref30","article-title":"Augmented reality: challenges & opportunities for security and privacy","volume":"1","author":"roesner","year":"2021","journal-title":"J Comput Secur Neurosci—Part"},{"article-title":"Detecting framerate-oriented cyber attacks on user experience in virtual reality","year":"2021","author":"odeleye","key":"ref11"},{"article-title":"Serious games: An overview","year":"2007","author":"susi","key":"ref33"},{"article-title":"A review of cyber security risks in an augmented reality world","year":"2018","author":"dissanayake","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953741"},{"key":"ref2","first-page":"3","author":"carmigniani","year":"2011","journal-title":"Augmented Reality An Overview"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2991\/icsem.2013.192"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"ref19","first-page":"427","article-title":"Ethics emerging: the story of privacy and security perceptions in virtual reality","author":"adams","year":"2018","journal-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00064"},{"article-title":"Security considerations for virtual reality systems","year":"2022","author":"viswanathan","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3428121"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802674"},{"key":"ref25","article-title":"Security and privacy approaches in mixed reality: A literature survey","volume":"52","author":"de guzman","year":"2019","journal-title":"ACM Comput Surv"},{"article-title":"Balancing user privacy and innovation in augmented and virtual reality","year":"2021","author":"dick","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873595"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390291"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517728"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24079"},{"article-title":"Exploring ransomware on the oculus quest 2","year":"2022","author":"mahan","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907942"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102951"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045724"},{"article-title":"Implementation of virtual reality in healthcare, entertainment, tourism, education, and retail sectors","year":"2021","author":"abdelmaged","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-87512-0_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6004-8_57"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1162\/pres.1997.6.4.355"}],"event":{"name":"2023 30th International Conference on Systems, Signals and Image Processing (IWSSIP)","start":{"date-parts":[[2023,6,27]]},"location":"Ohrid, North Macedonia","end":{"date-parts":[[2023,6,29]]}},"container-title":["2023 30th International Conference on Systems, Signals and Image Processing (IWSSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10180201\/10180228\/10180290.pdf?arnumber=10180290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T17:43:40Z","timestamp":1691430220000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10180290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iwssip58668.2023.10180290","relation":{},"subject":[],"published":{"date-parts":[[2023,6,27]]}}}