{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:39:00Z","timestamp":1774366740080,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679426","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"526-530","source":"Crossref","is-referenced-by-count":7,"title":["Cybersecurity as a Backbone for Sustainability"],"prefix":"10.1109","author":[{"given":"Gohar","family":"Sargsyan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref1","volume-title":"Energy Transition","year":"2022"},{"key":"ref2","volume-title":"The Attack on Colonial Pipeline: What Weve Learned & What Weve Done Over the Past Two Years","author":"Easterly","year":"2023"},{"key":"ref3","volume-title":"The biggest IT crash in history","year":"2024"},{"key":"ref4","volume-title":"SNS-JU - Smart Networks and Services Joint Undertaking, Europe"},{"key":"ref5","volume-title":"Digital Strategy, Cybersecurity","year":"2024"},{"key":"ref6","author":"Shiaeles","journal-title":"Internet of Things, Threats, andscape and Countermeasures"},{"key":"ref7","article-title":"Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation","volume-title":"Book","author":"Sargsyan","year":"2022"},{"key":"ref8","article-title":"Cyber Efficiency and Cyber Resilance","volume-title":"aCommunications of the ACM","author":"Linkov","year":"2023"},{"key":"ref9","volume-title":"Report: Climate pressures create \u2018perfect storm\u2019 of cyber threats against critical national infrastructure","year":"2023"},{"key":"ref10","volume-title":"Sustainability: How can cyber do its part of the job","year":"2024"},{"key":"ref11","volume-title":"NIST Cybersecurity Framework"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679426.pdf?arnumber=10679426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:24:06Z","timestamp":1727241846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679426","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}