{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:21:03Z","timestamp":1774264863975,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973625","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"1309-1313","source":"Crossref","is-referenced-by-count":15,"title":["International cyber security challenges"],"prefix":"10.23919","author":[{"given":"I.","family":"Duic","sequence":"first","affiliation":[]},{"given":"V.","family":"Cvrtila","sequence":"additional","affiliation":[]},{"given":"T.","family":"Ivanjko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0096340212459039"},{"key":"ref3","author":"tatalovie","year":"2008","journal-title":"Suvremene sigurnosne politike"},{"key":"ref10","article-title":"Cyberspace Extortion: North Korea versus the United States","author":"siboni","year":"2014","journal-title":"INSS Insight"},{"key":"ref6","author":"nye","year":"2012","journal-title":"Cyber war and peace"},{"key":"ref11","article-title":"Obrana od cyber-napada","volume":"9","author":"petrovie","year":"0","journal-title":"Hrvatski vojnik"},{"key":"ref5","author":"janczewski","year":"2008","journal-title":"Cyber Warfare and Cyber Terrorism"},{"key":"ref12","article-title":"Obama order sped up wave of cyberattacks against Iran","author":"sanger","year":"2012","journal-title":"The New York Times"},{"key":"ref8","author":"clarke","year":"2010","journal-title":"Cyber War The next Threat to National Security and What to Do about It"},{"key":"ref7","author":"carr","year":"2010","journal-title":"Inside Cyber Warfare"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0096340212438696"},{"key":"ref9","year":"2014","journal-title":"A Breakdown and Analysis of the Sony Hack"},{"key":"ref1","year":"2010","journal-title":"Strategic concept for the defence and security of the members of North Atlantic Treaty Organization"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2017,5,22]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973625.pdf?arnumber=7973625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:50:29Z","timestamp":1502884229000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973625","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}