{"id":"https://openalex.org/W2588210777","doi":"https://doi.org/10.1109/icitst.2016.7856652","title":"Keynote speaker 1: Critical Infrastructures SMART ready?","display_name":"Keynote speaker 1: Critical Infrastructures SMART ready?","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588210777","doi":"https://doi.org/10.1109/icitst.2016.7856652","mag":"2588210777"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856652","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057745074","display_name":"Martin Visser","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Martin Visser","raw_affiliation_strings":["Industrial Control Systems (ICS) environment, United States of America"],"affiliations":[{"raw_affiliation_string":"Industrial Control Systems (ICS) environment, United States of America","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5057745074"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24423536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.07940000295639038,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.07940000295639038,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.6413809061050415},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6403473019599915},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5887300372123718},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4890380799770355},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47722867131233215},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4394567310810089},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.4345855116844177},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.42185184359550476},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4211205244064331},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.41952672600746155},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11062821745872498}],"concepts":[{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.6413809061050415},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6403473019599915},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5887300372123718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4890380799770355},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47722867131233215},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4394567310810089},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.4345855116844177},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.42185184359550476},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4211205244064331},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.41952672600746155},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11062821745872498},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2016.7856652","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3076529025","https://openalex.org/W3212933010","https://openalex.org/W4283524929","https://openalex.org/W4390610562","https://openalex.org/W4400212587","https://openalex.org/W4380633315","https://openalex.org/W2932552503","https://openalex.org/W3136920987","https://openalex.org/W2899432044","https://openalex.org/W3113125424"],"abstract_inverted_index":{"The":[0],"EU":[1],"initiatives":[2],"for":[3,7,39],"Research":[4],"and":[5,12,26,42,63,72,88],"Innovation":[6],"excellent":[8],"science,":[9],"competitive":[10],"industries":[11],"a":[13],"better":[14],"society":[15],"together":[16],"with":[17],"the":[18,30,36,60,68,77],"new":[19],"Industry":[20],"possibilities":[21],"from":[22],"Internet":[23],"of":[24],"Things":[25],"SMART":[27],"technology":[28],"putting":[29],"Critical":[31],"Infrastructures":[32],"in":[33,65],"addition":[34],"to":[35,67,85,95],"advantages":[37],"also":[38],"technical,":[40],"organizational":[41],"Industrial":[43],"Control":[44],"Systems":[45],"security":[46],"challenges.":[47],"In":[48],"this":[49],"keynote":[50,78],"I":[51,79],"will":[52,80],"highlight":[53],"all":[54],"these":[55],"parts":[56],"as":[57,59],"well":[58],"cyber":[61],"risks":[62],"threats":[64],"relation":[66],"social":[69],"responsibility,":[70],"disruption":[71],"economical":[73],"damage.":[74],"To":[75],"complete":[76],"give":[81],"some":[82],"key":[83],"points":[84],"take":[86],"away":[87],"think":[89],"back":[90],"over":[91],"again":[92],"after":[93],"returning":[94],"your":[96],"institutions":[97],"or":[98],"businesses.":[99]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
