{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:59:23Z","timestamp":1776941963806,"version":"3.51.4"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11129994","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"1037-1042","source":"Crossref","is-referenced-by-count":2,"title":["ATHENA: A Federated Architecture for Cross-Border Cybersecurity Operations and Situational Awareness"],"prefix":"10.1109","author":[{"given":"Adamantini","family":"Peratikou","sequence":"first","affiliation":[{"name":"Open University of Cyprus,School of Pure And Applied Sciences,Nicosia,Cyprus"}]},{"given":"Evagoras","family":"Charalambous","sequence":"additional","affiliation":[{"name":"Digita Security Authority of Cyprus,Department of European Programs,Nicosia,Cyprus"}]},{"given":"Panayiota","family":"Smyrli","sequence":"additional","affiliation":[{"name":"Digita Security Authority of Cyprus,Department of European Programs,Nicosia,Cyprus"}]},{"given":"Stavros","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,School of Pure And Applied Sciences,Nicosia,Cyprus"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.04.028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9634507"},{"key":"ref4","article-title":"The WannaCry Ransomware Attack Has a Link to Suspected North Korean Hackers","author":"Greenberg","year":"2017","journal-title":"*WIRED*"},{"key":"ref5","article-title":"The Untold Story of NotPetya, the Most Devastating Cyberattack in History","author":"Greenberg","year":"2018","journal-title":"*WIRED*"},{"key":"ref6","volume-title":"NIS2 Directive","year":"2023"},{"key":"ref7","article-title":"General Data Protection Regulation (GDPR)","year":"2016","journal-title":"Regulation (EU) 2016\/679"},{"key":"ref8","volume-title":"Blueprint for Coordinated Response to Large-Scale Cybersecurity Incidents and Crises","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.33067\/se.2.2020.3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2021.1916975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.153019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2024.163010"},{"key":"ref13","article-title":"Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0","author":"Kott","year":"2018","journal-title":"arXiv (Cornell University)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671893"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata55660.2022.10020736"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/csr57506.2023.10224995"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cloudcom59040.2023.00057"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/csr61664.2024.10679473"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13731-019-0105-z"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.22.3.1921"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2021.154421"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4320924"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/csr51186.2021.9527904"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-022-00072-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2196\/48824"},{"key":"ref27","first-page":"1","article-title":"Information sharing models for cooperative cyber defence","volume-title":"International Conference on Cyber Conflict","author":"Hern\u00e1ndez-Ardieta"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2024.1497535"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.53555\/kuey.v30i4.2377"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11129994.pdf?arnumber=11129994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:07:52Z","timestamp":1756271272000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11129994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11129994","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}