{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T01:58:49Z","timestamp":1779328729682,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811391545","type":"print"},{"value":"9789811391552","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-13-9155-2_3","type":"book-chapter","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T02:03:04Z","timestamp":1560391384000},"page":"29-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybernetic Dependency Capacity"],"prefix":"10.1007","author":[{"given":"Jorge","family":"Barbosa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"key":"3_CR1","volume-title":"Inside Cyber Warfare","author":"J Carr","year":"2012","unstructured":"Carr, J.: Inside Cyber Warfare, 2nd edn. O\u2019Reilly Media Inc., Sebastopol, CA, USA (2012)","edition":"2"},{"key":"3_CR2","unstructured":"Ranger, S.: What is cyberwar? Everything you need to know about the frightening future of digital conflict. https:\/\/www.zdnet.com\/article\/cyberwar-a-guide-to-the-frightening-future-of-online-conflict\/ (2018). Acedido em 25 Setembro 2018"},{"key":"3_CR3","volume-title":"Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon","author":"K Zetter","year":"2014","unstructured":"Zetter, K.: Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon. Crown Publishers, NY (2014)"},{"key":"3_CR4","volume-title":"Cyber War: The Next Threat to National Security and What to do About","author":"RA Clark","year":"2010","unstructured":"Clark, R.A., Knake, R.K.: Cyber War: The Next Threat to National Security and What to do About. HarperCollins Publishers Inc, New York (2010)"},{"key":"3_CR5","volume-title":"Cyberspace and Cybersecurity","author":"GK Kostopoulos","year":"2013","unstructured":"Kostopoulos, G.K.: Cyberspace and Cybersecurity. CRC Press, Taylor & Francis Group, New York (2013)"},{"key":"3_CR6","unstructured":"Barbosa, J.:Pequenas pot\u00eancias militares convencionais, Grandes pot\u00eancias militares cibern\u00e9ticas - Abordagem da utiliza\u00e7\u00e3o de meios inform\u00e1ticos na defesa\/ataque militar moderno. IDN, Lisboa (2018)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar\u2014What Everyone Needs to Know. Oxford University Press, NY (2014)","DOI":"10.1093\/wentk\/9780199918096.001.0001"},{"key":"3_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2053-5","volume-title":"Building a Comprehensive IT Security Program","author":"Jeremy Wittkop","year":"2016","unstructured":"Wittkop, J.: Building a Comprehensive IT Security Program. Apress, Bolton, USA (2016)"},{"key":"3_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2065-8","volume-title":"Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide","author":"L Ayala","year":"2016","unstructured":"Ayala, L.: Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide. Apress, New York (2016)"}],"container-title":["Smart Innovation, Systems and Technologies","Developments and Advances in Defense and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9155-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T17:14:52Z","timestamp":1609866892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9155-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,14]]},"ISBN":["9789811391545","9789811391552"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9155-2_3","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"value":"2190-3018","type":"print"},{"value":"2190-3026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,14]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}