{"id":"https://openalex.org/W3035848771","doi":"https://doi.org/10.1109/icccs49078.2020.9118517","title":"Building a Security Framework for Smart Cities: A Case Study from UAE","display_name":"Building a Security Framework for Smart Cities: A Case Study from UAE","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3035848771","doi":"https://doi.org/10.1109/icccs49078.2020.9118517","mag":"3035848771"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118517","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000112565","display_name":"Abdallah Tubaishat","orcid":"https://orcid.org/0000-0002-9621-3574"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Abdallah Tubaishat","raw_affiliation_strings":["Zayed University, UAE"],"affiliations":[{"raw_affiliation_string":"Zayed University, UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063668583","display_name":"Mariam Al Jouhi","orcid":null},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mariam Al Jouhi","raw_affiliation_strings":["Zayed University, UAE"],"affiliations":[{"raw_affiliation_string":"Zayed University, UAE","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000112565"],"corresponding_institution_ids":["https://openalex.org/I91044093"],"apc_list":null,"apc_paid":null,"fwci":1.6226,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85401083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"477","last_page":"481"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11479","display_name":"Smart Cities and Technologies","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5612422823905945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5012776851654053},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.4150095283985138},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.2576808035373688}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5612422823905945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5012776851654053},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.4150095283985138},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2576808035373688}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118517","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W130347918","https://openalex.org/W2056240193","https://openalex.org/W2130553876","https://openalex.org/W2288522023","https://openalex.org/W2752737474","https://openalex.org/W2755987969","https://openalex.org/W2908828001","https://openalex.org/W3124524953","https://openalex.org/W3180443661","https://openalex.org/W3203626655","https://openalex.org/W6696294629","https://openalex.org/W6798401781","https://openalex.org/W6801879986"],"related_works":["https://openalex.org/W3007967230","https://openalex.org/W2030496847","https://openalex.org/W4313313264","https://openalex.org/W4323044487","https://openalex.org/W4281648943","https://openalex.org/W4281944087","https://openalex.org/W4213261556","https://openalex.org/W1534921012","https://openalex.org/W4320467350","https://openalex.org/W4214909121"],"abstract_inverted_index":{"Smart":[0],"cities":[1,10,104,163],"have":[2,24,363],"evolved":[3],"in":[4,55,123,136,189,213,228,345,388,400],"the":[5,9,31,172,184,195,200,205,235,244,272,312,321,325,332,361,389,396,401],"last":[6],"years,":[7],"leading":[8],"to":[11,15,18,70,85,182,191,209,215,230,253,290,297,307,335,347,370],"implement":[12],"initiatives":[13],"related":[14],"technical":[16],"aspects":[17,118],"improve":[19,216],"quality":[20],"of":[21,33,38,87,102,116,119,130,171,224,266,274,311,327,366,395],"life.":[22,315],"City-rankings":[23],"become":[25],"a":[26,99,120,258,280,298,367,377],"central":[27],"tool":[28],"for":[29,234,324,352,375,381],"assessing":[30],"attractiveness":[32],"urban":[34,56],"regions.":[35],"The":[36,111,240,384],"development":[37,86,326],"smart":[39,103,124,162,382,407],"cities,":[40],"however,":[41],"is":[42,109,174,247,320,386,405],"not":[43],"without":[44],"risk.":[45],"Cities":[46],"and":[47,52,67,105,134,147,149,159,176,197,219,264,269,288,295,304,342,360],"citizens":[48,75],"are":[49,153],"putting":[50],"more":[51,53,193,211],"responsibilities":[54],"systems.":[57],"Hence,":[58],"all":[59],"key":[60],"stakeholders":[61],"should":[62,80],"provide":[63],"an":[64,114],"effective":[65,328],"safety":[66],"security":[68,117,122,138,259,281,340,379],"response":[69],"any":[71],"situation":[72],"affecting":[73],"their":[74,106,232],"or":[76],"organizations.":[77],"Special":[78],"attention":[79],"be":[81,251],"paid":[82],"with":[83,128,156,166,243,350,373],"respect":[84],"services":[88,237],"aimed":[89],"at":[90],"reducing":[91],"cybercrime.":[92],"To":[93],"prevent":[94],"this,":[95],"we":[96],"believe":[97],"that":[98,248,283],"better":[100],"understanding":[101],"privacy":[107],"implications":[108],"needed.":[110],"paper":[112,333],"provides":[113],"overview":[115],"cyber":[121,137,339],"cities.":[125,383],"It":[126],"starts":[127],"exploration":[129],"various":[131,187],"definitions,":[132],"threats,":[133],"risks":[135],"as":[139,141,161],"well":[140],"threats":[142,152,287,296],"from":[143,226,292],"environments":[144],"both":[145],"internal":[146],"external":[148],"how":[150],"these":[151,286,293],"currently":[154],"mitigated":[155],"tools,":[157],"processes":[158],"technologies":[160,305,341],"utilizes":[164],"IoT":[165],"big":[167,267],"data.":[168],"Presently,":[169],"most":[170,397],"data":[173,225,246,268],"transmitted":[175],"collected":[177,245],"online.":[178],"Hackers":[179],"usually":[180],"try":[181],"exploit":[183],"vulnerabilities":[185],"using":[186],"tools":[188],"order":[190,214,229,346],"know":[192],"about":[194],"customers":[196,227],"then":[198],"misuse":[199,254],"customer's":[201],"information.":[202],"Enterprises,":[203],"on":[204,262,271,338],"other":[206],"hand,":[207],"continue":[208],"collect":[210,222],"information":[212],"services,":[217],"infrastructure,":[218],"security.":[220],"They":[221],"tons":[223],"complete":[231],"requirements":[233],"different":[236],"they":[238],"provide.":[239],"main":[241],"concern":[242],"it":[249],"can":[250,277,284],"vulnerable":[252],"by":[255],"hackers.":[256],"Building":[257],"framework":[260,380],"based":[261],"concepts":[263],"repositories":[265],"leveraging":[270],"intelligence":[273],"predictive":[275],"analytics":[276],"help":[278,289],"build":[279],"system":[282],"counter":[285],"guard":[291],"risk":[294],"large":[299],"extent.":[300],"Various":[301],"concepts,":[302],"applications,":[303],"interact":[306],"cover":[308],"every":[309],"aspect":[310],"digital":[313],"citizen's":[314],"Understanding":[316],"this":[317],"privacy-challenging":[318],"environment":[319],"basic":[322],"requirement":[323],"protection":[329],"mechanisms.":[330],"Thus,":[331],"aims":[334],"address":[336],"sentiments":[337],"cybercrime":[343],"awareness":[344],"come":[348,371],"up":[349,372],"recommendations":[351,374],"innovative":[353],"solutions.":[354],"A":[355],"survey":[356,385],"has":[357],"been":[358,364],"conducted":[359,387],"findings":[362],"analyzed":[365],"case":[368],"study":[369],"building":[376],"conceptualizing":[378],"United":[390],"Arab":[391],"Emirates":[392],"(UAE),":[393],"one":[394],"advanced":[398],"countries":[399],"MENA":[402],"region,":[403],"who":[404],"applying":[406],"city":[408],"concepts.":[409]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
