{"id":"https://openalex.org/W4323644059","doi":"https://doi.org/10.1109/msec.2023.3247946","title":"Current Perspectives on Securing Critical Infrastructures\u2019 Supply Chains","display_name":"Current Perspectives on Securing Critical Infrastructures\u2019 Supply Chains","publication_year":2023,"publication_date":"2023-03-08","ids":{"openalex":"https://openalex.org/W4323644059","doi":"https://doi.org/10.1109/msec.2023.3247946"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2023.3247946","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2023.3247946","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067577364","display_name":"Rodrigo Rom\u00e1n","orcid":"https://orcid.org/0000-0002-4099-1422"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rodrigo Roman","raw_affiliation_strings":["University of M&#x00E1;laga, M&#x00E1;laga, Spain"],"affiliations":[{"raw_affiliation_string":"University of M&#x00E1;laga, M&#x00E1;laga, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067782544","display_name":"Cristina Alcaraz","orcid":"https://orcid.org/0000-0003-0545-3191"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cristina Alcaraz","raw_affiliation_strings":["University of M&#x00E1;laga, M&#x00E1;laga, Spain"],"affiliations":[{"raw_affiliation_string":"University of M&#x00E1;laga, M&#x00E1;laga, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["University of M&#x00E1;laga, M&#x00E1;laga, Spain"],"affiliations":[{"raw_affiliation_string":"University of M&#x00E1;laga, M&#x00E1;laga, Spain","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001126368","display_name":"Kouichi Sakurai","orcid":"https://orcid.org/0000-0003-4621-1674"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouichi Sakurai","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067577364"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9384,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88010996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"21","issue":"4","first_page":"29","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.968500018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.7711400985717773},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.750636100769043},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.590324878692627},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5497772693634033},{"id":"https://openalex.org/keywords/current","display_name":"Current (fluid)","score":0.4313727021217346},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.33988067507743835},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.32828694581985474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30661648511886597},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2105441391468048},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.07295304536819458},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.06185832619667053}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.7711400985717773},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.750636100769043},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.590324878692627},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5497772693634033},{"id":"https://openalex.org/C148043351","wikidata":"https://www.wikidata.org/wiki/Q4456944","display_name":"Current (fluid)","level":2,"score":0.4313727021217346},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.33988067507743835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.32828694581985474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30661648511886597},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2105441391468048},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.07295304536819458},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.06185832619667053}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2023.3247946","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2023.3247946","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G7850875027","display_name":null,"funder_award_id":"SU-ICT-03-2018","funder_id":"https://openalex.org/F4320335254","funder_display_name":"Horizon 2020"}],"funders":[{"id":"https://openalex.org/F4320335254","display_name":"Horizon 2020","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2896099227","https://openalex.org/W2935503209","https://openalex.org/W3109269734","https://openalex.org/W3166079127","https://openalex.org/W3174930054","https://openalex.org/W3194459689","https://openalex.org/W3201894803","https://openalex.org/W4224297428","https://openalex.org/W4285202968","https://openalex.org/W4285213258","https://openalex.org/W4308347299","https://openalex.org/W4312344710"],"related_works":["https://openalex.org/W4382930947","https://openalex.org/W3152382318","https://openalex.org/W3004686567","https://openalex.org/W2738656338","https://openalex.org/W2555400967","https://openalex.org/W3214759741","https://openalex.org/W3081288631","https://openalex.org/W3174876210","https://openalex.org/W2388458847","https://openalex.org/W2086121498"],"abstract_inverted_index":{"Digitalization":[0],"and":[1,11,26],"industrial":[2],"paradigms":[3],"are":[4,30],"transforming":[5],"the":[6],"landscape":[7],"of":[8],"critical":[9],"infrastructures":[10],"supply":[12],"chains.":[13],"With":[14],"emerging":[15],"technologies,":[16],"it":[17],"is":[18],"possible":[19],"to":[20,23,32],"deploy":[21],"services":[22],"enhance":[24],"trust":[25],"transparency,":[27],"but":[28],"they":[29],"susceptible":[31],"threats,":[33],"as":[34],"discussed":[35],"in":[36],"this":[37],"article.":[38]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
