{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T18:27:27Z","timestamp":1725820047633},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140384"},{"type":"electronic","value":"9783319140391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14039-1_2","type":"book-chapter","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T06:58:09Z","timestamp":1428562689000},"page":"15-35","source":"Crossref","is-referenced-by-count":1,"title":["Alternatives to Cyber Warfare: Deterrence and Assurance"],"prefix":"10.1007","author":[{"given":"Robert J.","family":"Elder","sequence":"first","affiliation":[]},{"given":"Alexander H.","family":"Levis","sequence":"additional","affiliation":[]},{"given":"Bahram","family":"Yousefi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,10]]},"reference":[{"key":"2_CR1","unstructured":"Abu Jbara A, Levis AH (2013) Semantically correct representation of multi-model interoperations. Proc. 26th International FLAIRS Conference, St Pete Beach, FL, May"},{"key":"2_CR2","unstructured":"AFSAB (2008) Defending and operating in a contested cyber domain, Air Force Scientific Advisory Board, Sztipanovits J Levis AH (eds) SAB-TR-08\u201301"},{"key":"2_CR3","unstructured":"Alberts DS, Hayes RE (2005) Campaigns of experimentation: Pathways to innovation and transformation. CCRP Publication Series, Washington, DC"},{"key":"2_CR4","unstructured":"CPN Tools (2014)\n                  http:\/\/www.cpntools.org"},{"key":"2_CR5","unstructured":"DO-JOC (2006) Deterrence Operation Joint Operating Concept, Version 2.0, Department of Defense, 2006 (Available at\n                  http:\/\/www.dtic.mil\/futurejointwarfare\n                  \n                )"},{"key":"2_CR6","unstructured":"Geer Jr., Daniel E., (2010) Cybersecurity and national policy, Harvard National Security Journal, vol.\u00a01"},{"key":"2_CR7","unstructured":"Grevet JL, Levis AH (1988) Coordination in organizations with decision support systems. Proc. 1988 Symposium on C2 Research, Monterey, CA, June 1988, pp.\u00a0387\u2013399"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Gribaudo M, Iacono M (2014) An introduction to multiformalism modeling. In: Theory and Application of Multi-Formalism Modeling, Gribaudo M Iacono M (eds), IGI Global, Hershey, PA, pp.\u00a01\u201316","DOI":"10.4018\/978-1-4666-4659-9.ch001"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Hemingway G, Neema H, Sztipanovits J, Karsai G (2011) Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach. Simulation, March","DOI":"10.1177\/0037549711401950"},{"key":"2_CR18","unstructured":"INET (2014)\n                  http:\/\/inet.omnetpp.org"},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/b95112","volume-title":"Coloured Petri Nets","author":"K Jensen","year":"2009","unstructured":"Jensen K, Kristensen LM (2009) Coloured Petri Nets. Springer, Berlin"},{"key":"2_CR11","unstructured":"Levis AH (1992) A Colored Petri Net model of intelligent nodes. In: Robotics and Flexible Manufacturing Systems, Gentina JC Tzafestas SG (eds) Elsevier Science Publishers B. V., The Netherlands"},{"key":"2_CR12","unstructured":"Levis AH, Zaidi AK, Rafi MR (2012) Multi-modeling and meta-modeling of human organizations.Proc. 4th Int\u2019l Conf. on Applied Human Factors and Ergonomics\u2014AHFE2012 San Francisco, CA, July"},{"key":"2_CR13","unstructured":"OMNeT++ (2014)\n                  http:\/\/www.omnetpp.org"},{"key":"2_CR14","volume-title":"Engineering Adaptive and Resilient Computing Systems","author":"M Pflanz","year":"2014","unstructured":"Pflanz M, Levis AH (2014) On measuring resilience in Command and Control architectures. In: Suri N and Cabri G (eds) Engineering Adaptive and Resilient Computing Systems. Taylor & Francis, London"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/0005-1098(88)90010-6","volume":"24","author":"PA Remy","year":"1988","unstructured":"Remy PA, Levis AH, Jin VY (1988) On the design of distributed organizational structures.Automatica, 24(1) 81\u201386","journal-title":"Automatica"},{"key":"2_CR16","unstructured":"The Economist (2014) 411(8885):23\u201326"},{"key":"2_CR17","volume-title":"presentation to Cyber Warfare 2008","author":"Gen. Larry Welch","year":"2008","unstructured":"Welch, Gen. Larry (2008) presentation to Cyber Warfare 2008, London, U.K., 31 March 2008"}],"container-title":["Advances in Information Security","Cyber Warfare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14039-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:09:57Z","timestamp":1559149797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14039-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319140384","9783319140391"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14039-1_2","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2015]]}}}