{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T20:18:06Z","timestamp":1777666686462,"version":"3.51.4"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578789","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"73-75","source":"Crossref","is-referenced-by-count":26,"title":["Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident"],"prefix":"10.1109","author":[{"given":"Zakariya","family":"Dehlawi","sequence":"first","affiliation":[]},{"given":"Norah","family":"Abokhodair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"2012","journal-title":"The Network of Giant Oil Company 'Saudi Aramco' Was Hacked Today"},{"key":"17","year":"2012"},{"key":"18","year":"0"},{"key":"15","author":"berman","year":"2012","journal-title":"The Iranian Cyber Threat to the US Homeland"},{"key":"16","first-page":"75","article-title":"A Saudi outlook for cybersecurity strategies extrapolated from western experience","author":"al-saud","year":"2012","journal-title":"Joint Forces Quart"},{"key":"13","author":"carr","year":"2011","journal-title":"Inside Cyber Warfare Mapping the Cyber Underworld"},{"key":"14","author":"katz","year":"2011","journal-title":"Iran Embarks on 1b Cyber-warfare Program"},{"key":"11","author":"albright","year":"2011","journal-title":"Stuxnet Malware and Natanz Update of ISIS December 2 2010 Report"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"21","year":"2012","journal-title":"Shamoon A Two-stage Targeted Attack"},{"key":"20","year":"2012","journal-title":"More Details Discovered about aug\/5 Cyber Attack on Saudi Aramco-Pastebin Com"},{"key":"22","year":"2012","journal-title":"Shamoon the Wiper-Copycats at Work"},{"key":"23","author":"parkour","year":"2012","journal-title":"Shamoon or DistTrack A Samples"},{"key":"24","author":"clark","year":"2012","journal-title":"Shamoon Malware Infects Computers Steals Data Then Wipes Them"},{"key":"25","year":"0"},{"key":"26","author":"lawson","year":"2012","journal-title":"Anonymous Sources Provide No Evidence of Iran Cyber Attacks"},{"key":"27","author":"nakashima","year":"2012","journal-title":"Cyberattack on Mideast Energy Firms Was among Most Destructive Panetta Says"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.5040\/9798216010944","author":"cordesman","year":"2009","journal-title":"Saudi Arabia National Security in A Troubled Region"},{"key":"2","year":"2011","journal-title":"Global Energy Cyberattacks Night Dragon"},{"key":"10","author":"libicki","year":"2009","journal-title":"Cyberdeterrence and Cyberwar"},{"key":"1","year":"2011","journal-title":"Norton Study Calculates Cost of Global Cybercrime 114 Billion Annually"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2012.709391"},{"key":"6","year":"2012","journal-title":"Industrial Control Systems Cyber Emergency Response Team"},{"key":"5","author":"perlroth","year":"2012","journal-title":"Cyberattack on Saudi Oil Firm Disquiets U S"},{"key":"4","author":"helman","year":"2010","journal-title":"The World's Biggest Oil Companies"},{"key":"9","first-page":"1","article-title":"Assessing the risks of cyber terrorism, cyber war and other cyber threats","author":"lewis","year":"2002","journal-title":"Center for Strategic and International Studies"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Seattle, WA, USA","start":{"date-parts":[[2013,6,4]]},"end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578789.pdf?arnumber=6578789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:23:19Z","timestamp":1715944999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578789","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}