{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:08:18Z","timestamp":1730200098657,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006335","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"4265-4272","source":"Crossref","is-referenced-by-count":0,"title":["Technique for Finding and Investigating the Strongest Combinations of Cyberattacks on Smart Grid Infrastructure"],"prefix":"10.1109","author":[{"given":"Igor","family":"Kotsiuba","sequence":"first","affiliation":[]},{"given":"Inna","family":"Skarga-Bandurova","sequence":"additional","affiliation":[]},{"given":"Alkiviadis","family":"Giannakoulias","sequence":"additional","affiliation":[]},{"given":"Mykhailo","family":"Chaikin","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Jevremovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2631622"},{"journal-title":"Graphs & paths PageRank","year":"0","author":"pynes","key":"ref30"},{"journal-title":"Regin Top-Tier Espionage Tool Enables Stealthy Surveillance White Paper Symantec","year":"2014","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"bencs\u00e1th","year":"2012","journal-title":"The cousins of stuxnet Duqu flame and gauss Future Internet"},{"journal-title":"Symantec Security Response W32 Sality | Symantec","year":"2016","key":"ref12"},{"journal-title":"Kaspersky Labs Equation Group Questions and Answers White Paper Report No 1 5 #EquationAPT Moscow","year":"2015","key":"ref13"},{"journal-title":"Idiom Binaryforest&#x2014;AlienSpy Java Rat Overview","year":"2016","key":"ref14"},{"journal-title":"&#x2013; A Cross Plattform RAT White Paper V 3 0 #Adwind Kaspersky Labs","year":"2016","author":"kamluk","key":"ref15"},{"journal-title":"GreyEnergy (img) BlackEnergy (img) ESSET","year":"2018","key":"ref16"},{"key":"ref17","first-page":"6","article-title":"W32. Stuxnet Dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref18","article-title":"Behavioural analysis of recent rasomwares and prediction of future attacks by polymorphic and metamorphic rasomware","volume":"ii","author":"popli","year":"2019","journal-title":"in Computational Intelligence Theories applications and Future Directions &#x2013;"},{"journal-title":"Dissecting NotPetya","year":"0","author":"landry","key":"ref19"},{"journal-title":"Granular computing basic issues and possible solutions","year":"0","author":"yao","key":"ref28"},{"key":"ref4","first-page":"564","article-title":"Modelling and detection of camouflaging worms &#x2013; a survey","volume":"2","author":"chavan","year":"2012","journal-title":"Int J Emerg Technol Adv Eng"},{"journal-title":"Application of Big Data and Machine Learning in SG and Associated Security Concerns","year":"0","author":"hossain","key":"ref27"},{"key":"ref3","article-title":"Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types","author":"eder-neuhauser","year":"2018","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483668"},{"key":"ref29","first-page":"1150","author":"pedrycz","year":"2008","journal-title":"Fuzzy sets as a user-centric processing framework of granular computing Handbook of Granular Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/637241.637244"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2297678"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2004.1348281"},{"journal-title":"Security aspects of the smart grid Smart Grid Security","year":"2012","author":"ii","key":"ref2"},{"journal-title":"Microsoft Security Intelligence Report &#x2013; Zeroing in on Malware Propagation Methods","year":"2011","author":"faulhaber","key":"ref9"},{"key":"ref1","article-title":"The untold story of NotPetya, the Most Devastating Cyberattack in History","author":"greenberg","year":"2018","journal-title":"Wired"},{"journal-title":"Threat Report 5 Facts to be aware of for your business","year":"2018","author":"mcelroy","key":"ref20"},{"journal-title":"New GreyEnergy Malware Targets ICS Tied with BlackEnergy and TeleBots","year":"0","author":"ilacsu","key":"ref22"},{"journal-title":"Petya-Like Malware Campaign June 29 2017 CERT-EU Security Advisory CERT-EU-SA2017-014 Petya-Like Malware Campaign","year":"0","key":"ref21"},{"key":"ref24","first-page":"20","author":"kirichenko","year":"2018","journal-title":"Detecting cyber threats through social network analysis short survey"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3s","DOI":"10.1016\/j.diin.2015.05.002","article-title":"Graph-theoretic characterization of cyber-threat infrastructures","volume":"14","author":"boukhtouta","year":"2015","journal-title":"Digital Investigation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2017.8086078"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006335.pdf?arnumber=9006335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:47:20Z","timestamp":1658080040000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006335","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}