{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:27:52Z","timestamp":1759825672558,"version":"3.44.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913106","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T15:53:28Z","timestamp":1665590008000},"page":"39-44","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Hybrid Attacks and Operations to Assess the Threats in Early Warning Systems"],"prefix":"10.1109","author":[{"given":"Volodymyr","family":"Sherstjuk","sequence":"first","affiliation":[{"name":"Kherson National Technical University,Department of Software Tools and Technologies,Kherson,Ukraine"}]},{"given":"Maryna","family":"Zharikova","sequence":"additional","affiliation":[{"name":"Kherson National Technical University,Department of Software Tools and Technologies,Kherson,Ukraine"}]},{"given":"Stefan","family":"Pickl","sequence":"additional","affiliation":[{"name":"Institute for Theoretical Computer Science, Mathematics, and Operations Research University of Bundeswehr Munich,Neubiberg,Germany"}]},{"given":"Marina Alonso","family":"Villota","sequence":"additional","affiliation":[{"name":"Institute for Theoretical Computer Science, Mathematics, and Operations Research University of Bundeswehr Munich,Neubiberg,Germany"}]},{"given":"Irina","family":"Dorovskaja","sequence":"additional","affiliation":[{"name":"Kherson National Technical University,Department of Software Tools and Technologies,Kherson,Ukraine"}]},{"given":"Dmytro","family":"Chornyi","sequence":"additional","affiliation":[{"name":"Kherson National Technical University,Department of Software Tools and Technologies,Kherson,Ukraine"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44524-3_2"},{"key":"ref11","article-title":"A Framework for Hybrid Threat Analysis","author":"zharikova","year":"2022","journal-title":"Proc of 21th Int Conf on Security & Management (SAM'22)"},{"key":"ref12","first-page":"37","article-title":"Risk Assessment Framework Based on a Human Infrastructure Model","volume":"2740","author":"sherstjuk","year":"2020","journal-title":"CEUR Workshop Proceedings"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APUAVD.2015.7346620"},{"key":"ref14","first-page":"109","article-title":"Plausible event-tree networks for knowledge representation in real-time GIS-based decision support systems","volume":"2105","author":"sherstjuk","year":"2018","journal-title":"CEUR Workshop Proceedings"},{"key":"ref4","article-title":"Hybrid&#x201D; vs. &#x201C;Compound&#x201D; War: Lessons From The Ukraine Conflict","author":"minasyan","year":"2015","journal-title":"PONARS Eurasia Policy Memo"},{"key":"ref3","article-title":"The changing face of war: Into the fourth generation","volume":"22","author":"lind","year":"1989","journal-title":"Marine Corps Gazette"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5334\/sta.at"},{"key":"ref5","article-title":"Unrestricted Warfare","author":"qiao","year":"1999","journal-title":"PLA Literature and Arts Publishing House"},{"key":"ref8","article-title":"The Landscape of Hybrid Threats: A conceptual model","author":"giannopoulos","year":"2021","journal-title":"Ispra European Commission PUBSY No 117280"},{"key":"ref7","first-page":"202","article-title":"Hybrid warfare is a modern strategy of confrontation","volume":"11","author":"posmitukh","year":"2021","journal-title":"Social development and Security"},{"year":"0","key":"ref2"},{"year":"2022","key":"ref1","article-title":"Council of the European Union"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2019\/1981.12019"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913106.pdf?arnumber=9913106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:18:15Z","timestamp":1756235895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913106","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}