{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:11Z","timestamp":1775837411945,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579611","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-7","source":"Crossref","is-referenced-by-count":81,"title":["Solar Winds Hack: In-Depth Analysis and Countermeasures"],"prefix":"10.1109","author":[{"given":"Rahaf","family":"Alkhadra","sequence":"first","affiliation":[]},{"given":"Joud","family":"Abuzaid","sequence":"additional","affiliation":[]},{"given":"Mariam","family":"AlShammari","sequence":"additional","affiliation":[]},{"given":"Nazeeruddin","family":"Mohammad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"materese","year":"2017","journal-title":"About NIST"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772517"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772517"},{"key":"ref30","author":"n","year":"0","journal-title":"About NERC"},{"key":"ref34","author":"alrich","year":"2021","journal-title":"What could have prevented the SOLARWINDS ATTACKS?"},{"key":"ref10","year":"2002","journal-title":"Supply chain vulnerability Final report"},{"key":"ref11","author":"pritchard","year":"2021","journal-title":"Software supply chain attacks-everything you need to know"},{"key":"ref12","year":"0","journal-title":"How can a supply chain attack be prevented?"},{"key":"ref13","year":"0","journal-title":"Toto What is in-toto?"},{"key":"ref14","year":"2021","journal-title":"Reducing risk for the modern supply chain with third-party intelligence"},{"key":"ref15","author":"security","year":"2020","journal-title":"How many cip standards are there?"},{"key":"ref16","year":"2017","journal-title":"About NIST"},{"key":"ref17","year":"0","journal-title":"11 tactics to prevent supply chain attacks (HIGHLY EFFECTIVE) UPGUARD"},{"key":"ref18","author":"strawbridge","year":"2021","journal-title":"How to minimise the risk of supply chain attacks"},{"key":"ref19","year":"0","journal-title":"How to detect supply chain attacks"},{"key":"ref28","author":"pexton","year":"2021","journal-title":"Cleaning up solarwinds hack may cost as much as $100 billion"},{"key":"ref4","author":"kenton","year":"2020","journal-title":"How Supply Chains Work"},{"key":"ref27","author":"adriano","year":"2021","journal-title":"SolarWinds trojan hack could cost Cyber insurers SG$120 million"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(21)00065-8"},{"key":"ref6","author":"woodbury","year":"2021","journal-title":"Supply chain attacks"},{"key":"ref29","author":"shah","year":"0","journal-title":"The financial impact of solarwinds breach"},{"key":"ref5","year":"2019","journal-title":"Supply chain attacks What are they and how to beat them?"},{"key":"ref8","year":"0","journal-title":"Vulnerabilities Exploits and Threats"},{"key":"ref7","author":"kost","year":"2021","journal-title":"What is a supply chain attack? Why you should be worried about your vendors"},{"key":"ref2","year":"2021","journal-title":"Advancing CyberStability Report"},{"key":"ref9","author":"korolov","year":"2021","journal-title":"What is a supply chain attack? Why to be wary of third-party providers"},{"key":"ref1","author":"fruhlinger","year":"2020","journal-title":"What is a cyber attack? Recent examples show disturbing trends"},{"key":"ref20","author":"gillis","year":"2021","journal-title":"Supply chain attacks"},{"key":"ref22","author":"wilson","year":"2020","journal-title":"SolarWinds recap All of the federal agencies caught up in the Orion breach"},{"key":"ref21","author":"dhapola","year":"2020","journal-title":"Explained A MASSIVE Cyberattack in the us using a novel set of tools"},{"key":"ref24","year":"2020","journal-title":"The average cost of a data breach in 2020"},{"key":"ref23","author":"jankowicz","year":"2020","journal-title":"These big firms and us agencies all use software from the company breached in a massive hack being blamed on Russia"},{"key":"ref26","author":"novinson","year":"2021","journal-title":"SolarWinds hack could Cost Cyber insurance FIRMS $90 million"},{"key":"ref25","author":"dignan","year":"2021","journal-title":"SolarWinds cybersecurity Spending TOPS $3 million in Q4 sees $20 million to $25 million in 2021"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2021,7,6]]},"end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579611.pdf?arnumber=9579611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:42Z","timestamp":1652201742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579611","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}