{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:31:33Z","timestamp":1770845493402,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343238","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"1346-1353","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing the 2015 Ukraine Power Grid Cyber-Attack: A Quantitative Assessment of Adversary Behavior and Impact\n                    <sup>*<\/sup>"],"prefix":"10.1109","author":[{"given":"Marzieh","family":"Kordi","sequence":"first","affiliation":[{"name":"IMT School for Advanced Studies Lucca,Lucca,Italy"}]},{"given":"Syed Muhammad Fasih","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"}]},{"given":"Paolo","family":"Lollini","sequence":"additional","affiliation":[{"name":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"}]},{"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[{"name":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47590-5"},{"key":"ref2","first-page":"1","article-title":"Cyber-physical systems in the context of industry 4.0","author":"Oks","year":"2022","journal-title":"Information Systems Frontiers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13071191"},{"key":"ref4","year":"2020","journal-title":"IEC 62443, security for industrial automation and control systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102376"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2011.34"},{"key":"ref8","volume-title":"Common Attack Pattern Enumeration and Classification (CAPEC)","year":"2025"},{"key":"ref9","first-page":"2","article-title":"Threat agent library helps identify information security risks","author":"Casey","year":"2007","journal-title":"Intel White Paper"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10557-4_27"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43425-4_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC57035.2022.00016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-023-00209-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2017.8090056"},{"issue":"1-29","key":"ref15","first-page":"3","article-title":"Analysis of the cyber attack on the Ukrainian power grid","volume":"388","author":"Case","year":"2016","journal-title":"Electricity information sharing and analysis center (E-ISAC)"},{"key":"ref16","first-page":"82","article-title":"When The Lights Went Out: A Comprehensive Review Of The 2015 Attacks On Ukrainian Critical Infrastructure","author":"Hamilton","year":"2016","journal-title":"Industrial Cybersecurity Thread Briefing"},{"key":"ref17","article-title":"Cyber-attack against ukrainian critical infrastructure","volume-title":"Tech. Rep. ICS Alert (IRALERTH1605601)","author":"Alert","year":"2016"},{"key":"ref18","volume-title":"Sandworm team","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343238.pdf?arnumber=11343238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:50:54Z","timestamp":1770843054000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343238","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}