{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:03:06Z","timestamp":1764784986626},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1109\/smartgridcomm52983.2022.9961016","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T20:53:04Z","timestamp":1669927984000},"page":"380-386","source":"Crossref","is-referenced-by-count":7,"title":["On Holistic Multi-Step Cyberattack Detection via a Graph-based Correlation Approach"],"prefix":"10.1109","author":[{"given":"Omer","family":"Sen","sequence":"first","affiliation":[{"name":"IAEW, RWTH Aachen Univserity,Aachen,Germany"}]},{"given":"Chijioke","family":"Eze","sequence":"additional","affiliation":[{"name":"ACS, RWTH Aachen University,Aachen,Germany"}]},{"given":"Andreas","family":"Ulbig","sequence":"additional","affiliation":[{"name":"IAEW, RWTH Aachen Univserity,Aachen,Germany"}]},{"given":"Antonello","family":"Monti","sequence":"additional","affiliation":[{"name":"ACS, RWTH Aachen University,Aachen,Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CTTE.2017.8260938"},{"key":"ref11","article-title":"Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives","author":"sourour","year":"2009","journal-title":"CICS"},{"key":"ref12","article-title":"Cyber threat intelligence for improving cybersecurity and risk management in critical infrastructure","author":"kure","year":"2019","journal-title":"Journal of Universal Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT52182.2021.9587507"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP53232.2021.9674158"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340672"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2019.8886794"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.88"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NPSC.2016.7858975"},{"key":"ref27","article-title":"MulVAL: A Logic-based Network Security Analyzer","author":"ou","year":"2005","journal-title":"14th USENIX Security Symposium Baltimore"},{"key":"ref3","article-title":"Modern Trends and Skill Gaps of Cyber Security in Smart Grid","author":"siemers","year":"2021","journal-title":"EUROCON"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s21186225"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.141"},{"journal-title":"Smart Sovereignty The Security Shield for Smart Society 5 0","year":"2020","author":"aldabbas","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/etr.2014.0007"},{"key":"ref7","article-title":"Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures","author":"van der velde","year":"2020","journal-title":"Energy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4236\/sgre.2011.24035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPEDC47771.2019.9036484"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502585"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SEST50973.2021.9543359"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599708"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3154273.3154311"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2019.8685841"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/356698.356702"},{"key":"ref25","article-title":"Graph database applications and concepts with Neo4j","author":"miller","year":"2013","journal-title":"SAIS"}],"event":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","start":{"date-parts":[[2022,10,25]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,10,28]]}},"container-title":["2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9960863\/9960962\/09961016.pdf?arnumber=9961016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:38:03Z","timestamp":1672083483000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9961016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm52983.2022.9961016","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]}}}