{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:24:32Z","timestamp":1725791072604},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9468289","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:27:07Z","timestamp":1625516827000},"page":"171-188","source":"Crossref","is-referenced-by-count":3,"title":["Possibilities and Limitations of Cyber Threat Intelligence in Energy Systems"],"prefix":"10.23919","author":[{"given":"Csaba","family":"Krasznay","sequence":"first","affiliation":[]},{"given":"Gergo","family":"Gyebnar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Attackers Deploy New ICS Attack Framework &#x201C;TRITON&#x201D; and Cause Operational Disruption to Critical Infrastructure","year":"0","author":"johnson","key":"ref10"},{"journal-title":"Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware","year":"0","key":"ref11"},{"journal-title":"Carnegie Mellon University and The Johns Hopkins University Applied Physics Laboratory LLC","year":"0","key":"ref12"},{"journal-title":"Cyber Threat Intelligence Technical Committee","year":"0","key":"ref13"},{"journal-title":"Cyber Threat Intelligence Technical Committee","year":"0","key":"ref14"},{"key":"ref15","article-title":"NIS Investments","author":"drougkas","year":"2020","journal-title":"European Union Agency for Cybersecurity Heraklion Greece"},{"journal-title":"New EU Cybersecurity Strategy and new rules to make physical and digital critical entities more resilient","year":"0","key":"ref16"},{"journal-title":"Villamosenergetikai ipari feliigyeleti rendszerek kiberbiztonsagi kezikonyve Budapest Nemzetbiztonsagi Szakszolgalat Nemzeti Kibervedelmi Intezet","year":"2020","author":"gorgey","key":"ref4"},{"journal-title":"Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union","year":"2016","key":"ref3"},{"journal-title":"ATT&CK for Industrial Control Systems","year":"0","key":"ref6"},{"journal-title":"Nemzeti Energiastrategia 2030 kitekintessel 2040-ig","year":"2020","key":"ref5"},{"journal-title":"Microsoft report shows increasing sophistication of cyber threats","year":"0","author":"burt","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131734"},{"journal-title":"COUNCIL DECISION concerning restrictive measures against cyber-attacks threatening the Union or its Member States","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756890"},{"journal-title":"European Union Agency for Cybersecurity (ENISA) Attiki Greece","article-title":"European Union Agency for Cybersecurity (ENISA), &#x201C;Cyberthreat intelligence overview","year":"2020","key":"ref9"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2021,5,25]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09468289.pdf?arnumber=9468289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:11:49Z","timestamp":1628547109000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9468289","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}