{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:45:17Z","timestamp":1775382317522,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1109\/saci51354.2021.9465632","type":"proceedings-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T20:24:34Z","timestamp":1625084674000},"page":"397-402","source":"Crossref","is-referenced-by-count":4,"title":["Interdisciplinary Optimization of Security Operations Centers with Digital Assistant"],"prefix":"10.1109","author":[{"given":"Bence","family":"Tureczki","sequence":"first","affiliation":[]},{"given":"Katalin","family":"Szenes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1967","article-title":"Hungarian - Automatic program generation and robot control based on the resolution principle","author":"szenes","year":"0","journal-title":"Automatikus program gener&#x00E1;l&#x00E1;s &#x00E9;s robotvez&#x00E9;rl&#x00E9;s a rezol&#x00FA;ci&#x00F3; elve alapj&#x00E1;n"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.12700\/APH.17.5.2020.5.12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12700\/APH.17.6.2020.6.1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.12700\/APH.17.1.2020.1.8"},{"key":"ref15","year":"2020","journal-title":"Ethereum Node Tracker Etherscan"},{"key":"ref16","article-title":"Security operation center implementation on OpenStack","author":"tafazzoli","year":"2020","journal-title":"Telecommunications (IST) 2016 8th International Symposium on"},{"key":"ref17","article-title":"Celestial: A Smart Contracts Verification Framework","author":"dharanikota","year":"2020","journal-title":"Microsoft Research"},{"key":"ref18","article-title":"Blockene: A High-throughput Blockchain Over Mobile Devices","author":"satija","year":"2020","journal-title":"OSDI 2020 14th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref4","article-title":"eXpie &#x2013; your Morning Star for exploring cryptocurrency payments","author":"szenes","year":"2018","journal-title":"international online competition IBM (International Business Machines)"},{"key":"ref3","article-title":"CISA Review Manual","year":"0","journal-title":"Updated for 2019 Job Practice"},{"key":"ref6","article-title":"Governance - Risk - Security","author":"szenes","year":"2015","journal-title":"keynote lecture at SecureCEE Conference"},{"key":"ref5","article-title":"Experiences from Financial Services Industry","author":"szenes","year":"2018","journal-title":"keynote lecture at Security & Integrity Seminar"},{"key":"ref8","article-title":"Information technology - Security techniques - Information security management systems - Requirements","year":"2013","journal-title":"Reference number ISO\/IEC 27001 2013(E)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCyb.2013.6617622"},{"key":"ref2","article-title":"Blockchain basics, applications","author":"szenes","year":"2019","journal-title":"workshop presentation & article"},{"key":"ref1","article-title":"Society 4.0&#x201D;, &#x201E;T&#x00E1;rsadalom 4.0","author":"szenes","year":"2020","journal-title":"Hungarian Artificial Intelligence Coalition"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LINDI.2011.6031153"}],"event":{"name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","location":"Timisoara, Romania","start":{"date-parts":[[2021,5,19]]},"end":{"date-parts":[[2021,5,21]]}},"container-title":["2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9465482\/9465540\/09465632.pdf?arnumber=9465632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:04Z","timestamp":1652197384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9465632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/saci51354.2021.9465632","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]}}}