{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:17Z","timestamp":1756271417823,"version":"3.44.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130001","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"83-90","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures"],"prefix":"10.1109","author":[{"given":"Mehdi Akbari","family":"Gurabi","sequence":"first","affiliation":[{"name":"Aachen University,Fraunhofer FIT &#x0026; RWTH,Aachen,Germany"}]},{"given":"\u00d6mer","family":"Sen","sequence":"additional","affiliation":[{"name":"Aachen University,Fraunhofer FIT &#x0026; RWTH,Aachen,Germany"}]},{"given":"Navid","family":"Rahimidanesh","sequence":"additional","affiliation":[{"name":"Aachen University,RWTH,Aachen,Germany"}]},{"given":"Andreas","family":"Ulbig","sequence":"additional","affiliation":[{"name":"Aachen University,Fraunhofer FIT &#x0026; RWTH,Aachen,Germany"}]},{"given":"Stefan","family":"Decker","sequence":"additional","affiliation":[{"name":"Aachen University,Fraunhofer FIT &#x0026; RWTH,Aachen,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"ref2","article-title":"IDS Reference Architecture Model(Version 3.0)","author":"Otto","year":"2019","journal-title":"International Data Spaces Association"},{"issue":"14","key":"ref3","article-title":"Europe\u2019s quest for digital sovereignty: GAIA-X as a case study","volume":"21","author":"Autolitano","year":"2021","journal-title":"IAI papers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.101"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57978-3_11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pursup.2024.100951"},{"article-title":"Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain","volume-title":"Proceedings of the ITASEC","author":"Coppolino","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21752-5_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3688810"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9781119861775"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0007978103690376"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623144"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2023.3279274"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3117338"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3707651"},{"journal-title":"Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148 (NIS 2 Directive)","year":"2022","key":"ref17"},{"key":"ref18","article-title":"IEP 2.0 Framework Definition","author":"MacDonald","year":"2019","journal-title":"FIRST \u2014 Forum of Incident Response and Security Teams"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340528"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994542"},{"key":"ref21","first-page":"1","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression (stix)","volume":"11","author":"Barnum","year":"2012","journal-title":"Mitre Corporation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544478"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102609"},{"key":"ref25","first-page":"44","article-title":"Strengthening Cyber Defence through Cooperative Development and Shared Expertise in Incident Response Playbooks","author":"Akbari Gurabi","year":"2024","journal-title":"ERCIM News 139"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/52.469759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/en15062170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/en12132493"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2813280"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19538-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100233"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.026"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763853"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470477"},{"key":"ref36","article-title":"Usage Control in the International Data Spaces","author":"Eitel","year":"2021","journal-title":"International Data Spaces Association"},{"key":"ref37","article-title":"Information Exchange Policy 2.0 Framework Definition","author":"MacDonald","year":"2019","journal-title":"FIRST \u2014 Forum of Incident Response and Security Teams"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s43674-023-00057-z"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130001.pdf?arnumber=11130001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:34Z","timestamp":1756270354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130001","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}