{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:05:46Z","timestamp":1773871546535,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/USG.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/mc.2024.3404568","type":"journal-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:29:15Z","timestamp":1723483755000},"page":"82-89","source":"Crossref","is-referenced-by-count":6,"title":["Russian Cyber Onslaught Was Blunted by Ukrainian Cyber Resilience, Not Merely Security"],"prefix":"10.1109","volume":"57","author":[{"given":"Alexander","family":"Kott","sequence":"first","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"given":"George Yegor","family":"Dubynskyi","sequence":"additional","affiliation":[{"name":"Deputy Minister for Cybersecurity, Ministry of Digital Transformation of Ukraine, Kyiv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1622-1671","authenticated-orcid":false,"given":"Andrii","family":"Paziuk","sequence":"additional","affiliation":[{"name":"National Aviation University, Kyiv, Ukraine"}]},{"given":"Stephanie E.","family":"Galaitsi","sequence":"additional","affiliation":[{"name":"Engineer Research and Development Center, U.S. Army Corps of Engineers, Vicksburg, MS, USA"}]},{"given":"Benjamin D.","family":"Trump","sequence":"additional","affiliation":[{"name":"Engineer Research and Development Center, U.S. Army Corps of Engineers, Vicksburg, MS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0823-8107","authenticated-orcid":false,"given":"Igor","family":"Linkov","sequence":"additional","affiliation":[{"name":"Engineer Research and Development Center, U.S. Army Corps of Engineers, Vicksburg, MS, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"How technology helped Ukraine resist during wartime","year":"2023"},{"key":"ref2","volume-title":"In video, a Defiant President Zelensky Says, We Are Here,","author":"Hopkins","year":"2022"},{"issue":"3","key":"ref3","first-page":"113","article-title":"Why cyber dogs have yet to bark loudly in Russias invasion of Ukraine","volume":"5","author":"Kostyuk","year":"2022","journal-title":"Texas Nat. Secur. Rev."},{"key":"ref4","volume-title":"Russias wartime cyber operations in Ukraine: Military impacts, influences, and implications","author":"Bateman","year":"2022"},{"key":"ref5","volume-title":"Cyber war and Ukraine","author":"Lewis","year":"2022"},{"key":"ref6","volume-title":"Oxford English Dictionary","year":"2024"},{"key":"ref7","volume-title":"Cybersecurity","year":"2024"},{"key":"ref8","volume-title":"Cyber resiliency","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-160v2"},{"key":"ref10","volume-title":"Russia hacked an American Satellite company one hour before the ukraine invasion","author":"ONeill","year":"2022"},{"key":"ref11","volume-title":"Russian cyber and information warfare in practice","author":"Giles","year":"2023"},{"key":"ref12","volume-title":"The battle for control over Ukraines internet","author":"Bergengruen","year":"2022"},{"key":"ref13","volume-title":"Microsoft gives away 400m in cloud support to Ukraine","author":"Burt","year":"2022"},{"key":"ref14","volume-title":"How the cloud saved Ukraines data from Russian attacks","author":"White","year":"2024"},{"key":"ref15","volume-title":"Safeguarding Ukraines data to preserve its present and build its future","year":"2022"},{"key":"ref16","volume-title":"Ukraine has begun moving sensitive data outside its borders","author":"Stupp","year":"2022"},{"key":"ref17","volume-title":"Most Severe cyberattack since Russian invasion crashes Ukraine internet provider","author":"Brewster","year":"2022"},{"key":"ref18","volume-title":"A decade in the trenches of cyberwarfare: Ukraines story of resilience","author":"Noorma","year":"2024"},{"key":"ref19","volume-title":"Ukrainian military internet provider suffers cyberattack","author":"Beals","year":"2024"},{"key":"ref20","volume-title":"Russian hackers were inside Ukraine telecoms giant for months","author":"Balmforth","year":"2024"},{"key":"ref21","volume-title":"Kyivstar may need weeks to restore all services after cyber attack  CEO","year":"2023"},{"key":"ref22","volume-title":"Ukraine blames Russian sandworm hackers for Kyivstar attack","author":"Coker","year":"2024"},{"key":"ref23","volume-title":"Ukraine IT sector: Resilient, agile, and hopefully here to stay, blog","author":"Herbert","year":"2024"},{"key":"ref24","volume-title":"Road to war: U.S. struggled to convince allies, and Zelensky, of risk of invasion","author":"Harris","year":"2022"},{"key":"ref25","volume-title":"Ukraine says it thwarted a sophisticated Russian cyberattack on its power grid","author":"Conger","year":"2022"},{"key":"ref26","volume-title":"Ukraine says it thwarted Russian cyberattack on electricity grid, Reuters, London, U.K.","author":"Pearson","year":"2022"},{"key":"ref27","volume-title":"Russian hackers cut power to some Ukrainians last year, government official says","author":"Collier","year":"2023"},{"key":"ref28","volume-title":"Sandworm disrupts power in Ukraine using a novel attack against operational technology","author":"Proska","year":"2024"},{"key":"ref29","volume-title":"Iranian state actors conduct cyber operations against the Government of Albania","year":"2022"},{"key":"ref30","volume-title":"Cyber-attacks on Ukraine surge 123, but success rates plummet","author":"Poireault","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2022.2126193"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2\/10632595\/10633827.pdf?arnumber=10633827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T17:32:53Z","timestamp":1723743173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10633827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":31,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/mc.2024.3404568","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}