{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:35:29Z","timestamp":1738215329873,"version":"3.34.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851746","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"268-271","source":"Crossref","is-referenced-by-count":0,"title":["Interdisciplinary Research Project \u2018AI Shield\u2019"],"prefix":"10.1109","author":[{"given":"Thijs","family":"Van Ede","sequence":"first","affiliation":[{"name":"the University of Twente,Semantics, Cybersecurity and Services (SCS) group,Enschede,the Netherlands"}]},{"given":"Trix","family":"Mulder","sequence":"additional","affiliation":[{"name":"the Hanze University of Applied Sciences,Legal Aspects of Entrepreneurship,Groningen,the Netherlands"}]},{"given":"Evgeni","family":"Moyakine","sequence":"additional","affiliation":[{"name":"the University of Groningen,Transboundary Legal Studies (TLS),Groningen,the Netherlands"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"17","article-title":"Bits and locks from a cybersecurity perspective: Understanding and preventing ransomware attacks with LockBit as an example of top-tier ransomware","volume-title":"Tijdschrift voor Internetrecht","volume":"17","author":"Moyakine","year":"2024"},{"key":"ref2","first-page":"200","article-title":"Pulling the strings in cyberspace: Legal attribution of cyber operations based on state control","volume-title":"Responsible behaviour in cyberspace: Global narratives and practice","author":"Moyakine","year":"2023"},{"key":"ref3","article-title":"FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic","volume-title":"Network and distributed system security symposium (NDSS)","volume":"27","author":"Van Ede","year":"2020"},{"key":"ref4","article-title":"Deepcase: Semi-supervised contextual analysis of security events","volume-title":"2022 IEEE Symposium on Security and Privacy (SP), IEEE","author":"Van Ede","year":"2022"},{"key":"ref5","article-title":"ThreatKG: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management","volume-title":"arXiv","author":"Gao","year":"2022"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSP51992.2021.00046","article-title":"Extractor: Extracting attack behavior from threat reports","volume-title":"2021 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE","author":"Satvat","year":"2021"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSPW51379.2020.00010","article-title":"Automated penetration testing using deep reinforcement learning","volume-title":"2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE","author":"Hu","year":"2020"},{"volume-title":"ATT&CK","key":"ref8"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2024,12,4]]},"location":"Paris, France","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851746.pdf?arnumber=10851746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:45:27Z","timestamp":1738133127000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851746","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}