{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:38:57Z","timestamp":1725871137481},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319477282"},{"type":"electronic","value":"9783319477299"}],"license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47729-9_19","type":"book-chapter","created":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T06:01:03Z","timestamp":1478930463000},"page":"184-192","source":"Crossref","is-referenced-by-count":5,"title":["Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids"],"prefix":"10.1007","author":[{"given":"Alexandr","family":"Vasenev","sequence":"first","affiliation":[]},{"given":"Lorena","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Ceccarelli","sequence":"additional","affiliation":[]},{"given":"Anhtuan","family":"Le","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Ionita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"19_CR1","unstructured":"CS-CERT: ICS-CERT year in review. https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2014_Final.pdf"},{"key":"19_CR2","unstructured":"The Open Group: Technical standard. Risk taxonomy. http:\/\/pubs.opengroup.org\/onlinepubs\/9699919899\/toc.pdf"},{"key":"19_CR3","unstructured":"Intel IT: Prioritizing information security risks with threat agent risk assessment. http:\/\/www.intel.com\/Assets\/en_US\/PDF\/whitepaper\/wp_IT_Security_RiskAssessment.pdf"},{"key":"19_CR4","first-page":"14","volume":"2008","author":"A Najgebauer","year":"2008","unstructured":"Najgebauer, A., Antkiewicz, R., Chmielewski, M., Kasprzyk, R.: The prediction of terrorist threat on the basis of semantic association acquisition and complex network evolution. J. Telecommun. Inf. Technol. 2008, 14\u201320 (2008)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-23082-0_9","volume-title":"Foundations of Security Analysis and Design VI","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Risk analysis of changing and evolving systems using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 231\u2013274. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23082-0_9"},{"issue":"5","key":"19_CR6","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MPAE.2004.1338120","volume":"2","author":"K Morison","year":"2004","unstructured":"Morison, K., Wang, L., Kundur, P.: Power system security assessment. IEEE Power Energy Mag. 2(5), 30\u201339 (2004)","journal-title":"IEEE Power Energy Mag."},{"key":"19_CR7","unstructured":"IRENE: D2.1 threats identification and ranking. http:\/\/www.ireneproject.eu"},{"key":"19_CR8","unstructured":"IRENE: D2.2 societal impact of attacks and attack motivations. http:\/\/www.ireneproject.eu"},{"key":"19_CR9","first-page":"3","volume-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"EM Hutchins","year":"2010","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, p. 3. Lockheed Martin Corporation, Bethesda (2010)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Le, A., Chen, Y., Chai, M., Vasenev, A., Montoya, L: Assessing loss event frequencies of smart grid cyber threats: encoding flexibility into FAIR using bayesian network approach, smartgifts conference on smart grid inspired future technologies (2016)","DOI":"10.1007\/978-3-319-47729-9_5"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid Inspired Future Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47729-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T10:33:19Z","timestamp":1568543599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47729-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"ISBN":["9783319477282","9783319477299"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47729-9_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016,11,13]]}}}