{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:43:18Z","timestamp":1765039398324},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811058608"},{"type":"electronic","value":"9789811058615"}],"license":[{"start":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T00:00:00Z","timestamp":1508198400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-5861-5_10","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T08:59:44Z","timestamp":1508144384000},"page":"217-231","source":"Crossref","is-referenced-by-count":5,"title":["Cyber Defence Capabilities in Complex Networks"],"prefix":"10.1007","author":[{"given":"Dragos\u0327","family":"Ionic\u01ce","sequence":"first","affiliation":[]},{"given":"Nirvana","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Decebal","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Florin","family":"Pop","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"10_CR1","unstructured":"Ottis, Rain and Lorents, Peeter. 2010. Cyberspace: Definitions and Implications. In 5th international conference on information warfare and security, (Dayton OH, US: Cooperative Cyber Defence Centre of Excellence)."},{"key":"10_CR2","volume-title":"Cybernetics: Or control and communication in the animal and the machine","author":"Norbert Wiener","year":"1948","unstructured":"Wiener, Norbert. 1948. Cybernetics: Or control and communication in the animal and the machine. Cambridge: The MIT Press."},{"key":"10_CR3","unstructured":"Thill, Scott. March 17, 1948: William Gibson. 2011. Father of Cyberspace. Wired.com. March 2011. http:\/\/www.wired.com\/thisdayintech\/2011\/03\/0317cyberspace-author-william-gibson-born\/ ."},{"key":"10_CR4","unstructured":"Kuehl, Dr Dan. 2009. From Cyberspace to Cyberpower: Defining the Problem. [book auth.] Stuart H. Starr, and Larry K. Wentz Franklin D. Kramer. Cyberpower and National Security. s.l.: Potomac Books, Inc., Vols. in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz."},{"key":"10_CR5","volume-title":"On cyber warfare","author":"Paul Cornish","year":"2010","unstructured":"Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. 2010. On cyber warfare. London: Chatham House. November."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Andress and Winterfeld. 2011. Cyber warfare; techniques, tactics and tools for security practitioners. New York: Elsevier.","DOI":"10.1016\/B978-1-59749-637-7.00004-6"},{"key":"10_CR7","unstructured":"US Department of Defence. The National Military Strategy for Cyberspace Operations. December 2006."},{"key":"10_CR8","unstructured":"Ministry of Security and Justice. Cyber Security Beeld Nederland. December June 2012. CSBN-2."},{"key":"10_CR9","unstructured":"US Department of Defence. Joint Publication 3-0, Joint Operations. August 2011."},{"key":"10_CR10","unstructured":"NATO. Allied Joint Doctrine for Information Operations. November 2009. AJP 3.10."},{"key":"10_CR11","unstructured":"Mirkovic, Jelena, et al. 2010. The DETER project: Advancing the science of cyber security experimentation and test. IEEE. 978-1-4244-6048-9\/10."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"West-Brown, et al. Handbook for computer security incident response teams (CSIRTs). (New York: Carnegie Mellon University, 2003). CMU\/SEI-2003-HB-002.","DOI":"10.21236\/ADA413778"},{"key":"10_CR13","unstructured":"Benzel, et al. 2007. Design, Deployement and Use of the DETER Testbed. In DETER community workshop on cyber-security and test, Boston, August 2007."},{"key":"10_CR14","unstructured":"NC3A. 2010. Cyber Defence Capability Framework. December 2010."},{"key":"10_CR15","unstructured":"BuxBaum, Peter A. 2011. Building a Better \u2019Cyber Range\u2019. August 2011."},{"key":"10_CR16","unstructured":"Sabo, Robert P. 2006. Standing Up the Information Operations Range. 2006."},{"key":"10_CR17","unstructured":"Powell, Robert, Holmes, Timoty K. and Pie, Cesar E. 2010. The information assurance range. ITEA Journal 31: 473\u2013477."},{"key":"10_CR18","unstructured":"UK Ministry of Defence. Defence Minister opens UK cyber security test range. Ministry of Defence. http:\/\/www.mod.uk\/DefenceInternet\/DefenceNews\/DefencePolicyAndBusiness\/DefenceMinisterOpensUkCyberSecurityTestRange.htm ."},{"key":"10_CR19","unstructured":"US Department of Defence. 2009. The Global Information Grid (GIG) 2.0. Concept of Operations. March 2009. Version 1.1."},{"key":"10_CR20","unstructured":"Watson. Combat Readiness through Resilience in Hostile Cyber Environments."},{"key":"10_CR21","unstructured":"Welshans. 2010. History of cyber testing and evaluation - A voice from the front lines. ITEA Journal 31: 449\u2013452."},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Benzel, et al. 2009. Current Developements in DETER Cybersecurity Testbed Technology.","DOI":"10.1109\/CATCH.2009.30"},{"key":"10_CR23","unstructured":"DARPA. National Cyber Range. http:\/\/www.darpa.mil\/Our_Work\/STO\/Programs\/National_Cyber_Range_(NCR).aspx ."},{"key":"10_CR24","unstructured":"Defence Information Systems Agency. Department of Defence Information Assurance Range: A Venue for Test and Evaluation in Cyberspace. August 2011."},{"key":"10_CR25","unstructured":"NATO Cooperative Cyber Defence Centre of Excellence. CCD COE Training Courses -CCD COE. http:\/\/www.ccdcoe.org\/236.html ."}],"container-title":["Internet of Things","Internet of Everything"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5861-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T18:34:56Z","timestamp":1570214096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5861-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,17]]},"ISBN":["9789811058608","9789811058615"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5861-5_10","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2017,10,17]]}}}