{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:22:14Z","timestamp":1775470934374,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,17]]},"DOI":"10.1109\/wfcs60972.2024.10540775","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T17:28:06Z","timestamp":1717176486000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure"],"prefix":"10.1109","author":[{"given":"Alexios","family":"Lekidis","sequence":"first","affiliation":[{"name":"University of Thessaly,Greece"}]},{"given":"Vasileios","family":"Mavroeidis","sequence":"additional","affiliation":[{"name":"University of Oslo,Norway"}]},{"given":"Konstantinos","family":"Fysarakis","sequence":"additional","affiliation":[{"name":"Sphynx Analytics Limited,Cyprus"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Threat Landscape report","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103454"},{"key":"ref3","journal-title":"Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148 (NIS 2 Directive)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020736"},{"key":"ref5","article-title":"Ami network (ami head-end to\/from smart meters)","year":"2012","journal-title":"Onramp Wireless, San Diego, CA, USA, Tech. Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0009187307330741"},{"key":"ref7","author":"Souppaya","year":"2017","journal-title":"Guide for cybersecurity incident recovery"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671893"},{"key":"ref9","author":"Mavroeidis","year":"2022","journal-title":"Cybersecurity playbook sharing with stix 2.1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224922"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244778"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600195"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W54100.2022.00015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00760-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APAP47170.2019.9225126"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3015220"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026923"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224995"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42500-5_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883456"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695725"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66763-4_22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500082"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544476"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE51841.2020.9436545"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935040"},{"key":"ref30","journal-title":"22317:2021 security and resilience - business continuity management systems - guidelines for business impact analysis"}],"event":{"name":"2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)","location":"Toulouse, France","start":{"date-parts":[[2024,4,17]]},"end":{"date-parts":[[2024,4,19]]}},"container-title":["2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10540648\/10540717\/10540775.pdf?arnumber=10540775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T05:13:47Z","timestamp":1717218827000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10540775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/wfcs60972.2024.10540775","relation":{},"subject":[],"published":{"date-parts":[[2024,4,17]]}}}