{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:33:56Z","timestamp":1777631636891,"version":"3.51.4"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10181813","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"121-139","source":"Crossref","is-referenced-by-count":5,"title":["Analytical Review of the Resilience of Ukraine\u2019s Critical Energy Infrastructure to Cyber Threats in Times of War"],"prefix":"10.23919","author":[{"given":"Andrii","family":"Davydiuk","sequence":"first","affiliation":[{"name":"PhD Candidate, G. E. Pukhov Institute for Modelling in Energy Engineering NAS of Ukraine,Kyiv,Ukraine"}]},{"given":"Vitalii","family":"Zubok","sequence":"additional","affiliation":[{"name":"Doctor of Engineering, G. E. Pukhov Institute for Modelling in Energy Engineering NAS of Ukraine,Kyiv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cyberattacks in hybrid warfare: The case of Russia\/Ukraine War","volume-title":"HeadMind Partners"},{"key":"ref2","article-title":"Full-scale Russian invasion of Ukraine: historical context","volume-title":"GOV.UA."},{"key":"ref3","article-title":"How does the Internet work in the DPR \u2013 a letter from a reader from the occupied territories","volume-title":"Tokar.ua."},{"key":"ref4","article-title":"Russian state-sponsored and criminal cyber threats to critical infrastructure","volume-title":"Cybersecurity and Infrastructure Security Agency"},{"key":"ref5","volume-title":"Iranian and Russian hackers targeting politicians and journalists, warn UK officials","author":"Corera"},{"key":"ref6","article-title":"Russian cyberwarfare: Unpacking the Kremlin\u2019s capabilities","volume-title":"CEPA","author":"Soldatov"},{"key":"ref7","article-title":"Use of Russian technology products and services following the invasion of Ukraine","volume-title":"NCSC","author":"Levy"},{"key":"ref8","article-title":"Ericsson divests its local customer support business in Russia","volume-title":"Ericsson"},{"key":"ref9","article-title":"Cyber, artillery, propaganda. general overview of the dimensions of Russian aggression","volume-title":"GOV.UA."},{"key":"ref10","article-title":"\u2018Ukrenergo\u2019 under war conditions: Attacks increased threefold to block joining European power network","volume-title":"GOV.UA."},{"key":"ref11","article-title":"CERT-UA has processed over 2,000 cyberattacks against Ukraine year to date","volume-title":"GOV.UA."},{"key":"ref12","article-title":"Russian hackers attempted to cut electricity supply to many Ukrainians","volume-title":"GOV.UA."},{"key":"ref13","article-title":"CERT-UA","volume-title":"GOV.UA."},{"key":"ref14","article-title":"Cyber Kill Chain\u00ae","volume-title":"Lockheed Martin"},{"key":"ref15","article-title":"\u2018Attribution of advanced persistent threats\u2019 notes.\u201d","volume-title":"Medium","author":"Warner"},{"key":"ref16","article-title":"General recommendations for reducing the consequences of exposure to malicious software","volume-title":"GOV.UA."},{"key":"ref17","article-title":"BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents","volume-title":"Securelist | Kaspersky\u2019s threat research and reports"},{"key":"ref18","article-title":"Stop doing business with Russia","volume-title":"#LeaveRussia: list of companies that have stopped or continue to work in Russia"},{"key":"ref19","article-title":"Opendatabot and Netpeak Create List of Software of Russian Origin \u2013 Opendatabot","volume-title":"Opendatabot"},{"key":"ref20","article-title":"Ukraine confronts the threat of Kremlin penetration into unreformed state bodies","volume-title":"Atlantic Council","author":"D\u2019Anieri"},{"issue":"89","key":"ref21","doi-asserted-by":"crossref","first-page":"59","DOI":"10.32918\/nrs.2021.1(89).07","article-title":"Investigation of the problem of cyber survivability of objects of critical information infrastructure","volume":"1","author":"Komarov","year":"2021","journal-title":"Nuclear and Radiation Safety"},{"key":"ref22","article-title":"A Blog with No Name","volume-title":"Team Cymru","author":"Team"},{"key":"ref23","article-title":"Official website of the unified register of Russian programs","volume-title":"GOV.RU."},{"key":"ref24","volume-title":"Resolution of the Cabinet of Ministers of Ukraine No. 1426, On approval of the Regulation on the organizational and technical model of cyber protection","year":"2021"},{"key":"ref25","volume-title":"Law of Ukraine No. 3475-IV \u201cOn the State Service of Special Communication and Information Protection of Ukraine.\u201d","year":"2006"},{"key":"ref26","volume-title":"Decree of the President of Ukraine No. 447\/2021 On the decision of the National Security and Defense Council of Ukraine dated May 14, 2021 \u201cOn the Cybersecurity Strategy of Ukraine.\u201d","year":"2021"},{"key":"ref27","volume-title":"Resolution of the Cabinet of Ministers of Ukraine No. 1295, Some issues of ensuring the functioning of the system for detecting vulnerabilities and responding to cyber incidents and cyberattacks","year":"2020"},{"key":"ref28","article-title":"Strikes on critical infrastructure of Ukraine during the Russian-Ukrainian war","volume-title":"Wikipedia"},{"key":"ref29","article-title":"How a voltage glitch attack could cripple your SoC or MCU \u2013 and how to securely protect it","volume-title":"Design And Reuse","author":"Invia"},{"key":"ref30","article-title":"Energy survival: Alternative energy sources during power outages in Kharkiv","volume-title":"OPINION. MEDIA","author":"Kadomska"},{"key":"ref31","article-title":"On cloud services: Law of Ukraine dated February 17, 2022 No. 2075-IX","volume-title":"GOV.UA."},{"key":"ref32","article-title":"Reforming the system of training professional personnel in the field of cyber security in Ukraine: the first six professional standards have been approved","volume-title":"GOV.UA."},{"key":"ref33","article-title":"Cr0n. 20 search engines for pentesters. Average","volume-title":"KR Labs"},{"key":"ref34","article-title":"The 7 tenets of zero trust","volume-title":"Cimcor","author":"Yacono"},{"key":"ref35","article-title":"Shodan trends","volume-title":"Shodan"},{"key":"ref36","article-title":"Regarding the exchange of information on cyber threats","volume-title":"GOV.UA."},{"key":"ref37","article-title":"Enhancing the protection and cyber-resilience of critical information infrastructure","volume-title":"Digital Regulation"},{"key":"ref38","volume-title":"Decree of the Cabinet of Ministers of Ukraine No. 1556-r, On the approval of the Concept of the development of artificial intelligence in Ukraine","year":"2020"},{"key":"ref39","volume-title":"Decree of the President of Ukraine No. 184\/2020 On the decision of the National Security and Defense Council of Ukraine dated May 14, 2020 \u201cOn the application, cancellation and amendment of personal special economic and other restrictive measures (sanctions).\u201d"},{"key":"ref40","first-page":"127","article-title":"Anti-phishing infrastructure as a means of countering threats to the functioning of critical purpose systems","volume-title":"XIII International Scientific and Practical Conference of Young Scientists Information Technologies: Economy, Technologies, Education 2022","author":"Davidyuk"},{"key":"ref41","article-title":"Changes in the terms of providing tariffs and services","volume-title":"Kyivstar"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/nclimate2227"},{"key":"ref43","article-title":"Global Cyber Security Index","volume-title":"ITU"},{"key":"ref44","article-title":"World indices of cyber security: overview and methods of formation","volume-title":"Global report \/ Catalog, Monograph","author":"Khudyntsev","year":"2022"},{"key":"ref45","article-title":"NCCC representatives discussed with the director of NATO\u2019s Joint Center for Advanced Technologies on Cyber Defense the issue of deepening practical cooperation between Ukraine and the Center","volume-title":"GOV.UA"},{"key":"ref46","volume-title":"Decree of the President of Ukraine No. 37\/2022 On the decision of the National Security and Defense Council of Ukraine dated December 30, 2021 \u201cOn the Implementation Plan of the Cybersecurity Strategy of Ukraine.\u201d","year":"2020"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2023,5,30]]},"end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10181813.pdf?arnumber=10181813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T04:52:03Z","timestamp":1712983923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10181813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":46,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10181813","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}