{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:20Z","timestamp":1740137360859,"version":"3.37.3"},"reference-count":131,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T00:00:00Z","timestamp":1698969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T00:00:00Z","timestamp":1698969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00772-1","type":"journal-article","created":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T19:01:54Z","timestamp":1699038114000},"page":"963-980","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A survey and characterization of Close Access Cyberspace Operations"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5598-8461","authenticated-orcid":false,"given":"Antonio","family":"Villal\u00f3n-Huerta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8592-0786","authenticated-orcid":false,"given":"Ismael","family":"Ripoll-Ripoll","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6976-5763","authenticated-orcid":false,"given":"Hector","family":"Marco-Gisbert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,3]]},"reference":[{"key":"772_CR1","unstructured":"Joint\u00a0Chiefs of\u00a0Staff: Joint publication 3\u201312. Cyberspace Operations (2018)"},{"key":"772_CR2","unstructured":"NATO: Allied Joint Publication-3.20. Allied Joint Doctrine for Cyberspace Operations. Technical report (2020)"},{"key":"772_CR3","doi-asserted-by":"crossref","unstructured":"Joint Chiefs of Staff: Joint Publication 3\u201313. Information Operations, Department of Defense (2012)","DOI":"10.21236\/ADA577497"},{"key":"772_CR4","unstructured":"Murphy, D.M.: Information operations primer. fundamentals of information operations. Technical Report AY12, U.S. Army War College, Department of Military Strategy, Planning, and Operations (2011)"},{"key":"772_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288","volume-title":"Tallinn Manual on the International Law Applicable to Cyber Warfare","author":"MN Schmitt","year":"2013","unstructured":"Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)"},{"key":"772_CR6","unstructured":"Palbo, H., Kronborg, L.: Joint doctrine for military cyberspace operations. Technical report, Royal Danish Defence College (2019)"},{"key":"772_CR7","unstructured":"UK Ministry of Defence: Cyber primer. Technical report, UK Ministry of Defence (2022)"},{"key":"772_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/9781316422724","volume-title":"Cyber Mercenaries","author":"T Maurer","year":"2018","unstructured":"Maurer, T.: Cyber Mercenaries. Cambridge University Press, Cambridge (2018)"},{"key":"772_CR9","unstructured":"Strom, B.E., Battaglia, J.A., Kemmerer, M.S., Kupersanin, W., Miller, D.P., Wampler, C., Whitley, S.M., Wolf, R.D.: Finding cyber threats with ATT &CK\u2122-based analytics. Technical report, MITRE Technical Report MTR170202. The MITRE Corporation (2017)"},{"key":"772_CR10","doi-asserted-by":"crossref","unstructured":"Joint Chiefs of Staff: Joint Publication 1\u201302. Department of Defense Dictionary of Military and Associated Terms, Department of Defense (2010)","DOI":"10.21236\/ADA536504"},{"key":"772_CR11","doi-asserted-by":"crossref","unstructured":"Johnson, C., Badger, L., Waltermire, D., Snyder, L., Skrorupka, C.: NIST SP 800\u2013150. Guide to Cyber Threat Information Sharing, National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.SP.800-150"},{"issue":"3","key":"772_CR12","first-page":"452","volume":"22","author":"S Lefebvre","year":"2009","unstructured":"Lefebvre, S.: Cuban intelligence activities directed at the United States, 1959\u20132007. Int. J. Intell. Counter Intell. 22(3), 452\u2013469 (2009)","journal-title":"Int. J. Intell. Counter Intell."},{"key":"772_CR13","doi-asserted-by":"crossref","unstructured":"Storey, I., Thayer, C.A.: Cam ranh bay: past imperfect, future conditional. Contemporary Southeast Asia, pages 452\u2013473, 2001","DOI":"10.1355\/CS23-3D"},{"key":"772_CR14","doi-asserted-by":"crossref","unstructured":"Cocroft, W.D., Schofield, J.: Archaeology of the Teufelsberg: Exploring Western Electronic Intelligence Gathering in Cold War Berlin. Routledge, 2019","DOI":"10.4324\/9780429442629"},{"key":"772_CR15","unstructured":"Kris, D.S.: The NSA\u2019s new sigint annex. Journal of National Security Law & Policy, 2021"},{"key":"772_CR16","first-page":"27","volume":"4","author":"SR Chabinsky","year":"2010","unstructured":"Chabinsky, S.R.: Cybersecurity strategy: a primer for policy makers and those on the front line. J. Nat\u2019l Sec. L. Pol\u2019y 4, 27 (2010)","journal-title":"J. Nat\u2019l Sec. L. Pol\u2019y"},{"key":"772_CR17","unstructured":"Long, J.: No tech hacking: a guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2011"},{"issue":"6","key":"772_CR18","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","volume":"44","author":"T Kwon","year":"2013","unstructured":"Kwon, T., Shin, S., Na, S.: Covert attentional shoulder surfing: Human adversaries are more powerful than expected. IEEE Trans. Syst. Man Cybern. Syst. 44(6), 716\u2013727 (2013)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"5","key":"772_CR19","first-page":"1","volume":"9","author":"K Manske","year":"2000","unstructured":"Manske, K.: An introduction to social engineering. Inf. Secur. J. A Glob. Perspect. 9(5), 1\u20137 (2000)","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"772_CR20","doi-asserted-by":"crossref","unstructured":"Thornburgh, T.: Social engineering: the \u201cdark art\u201d. In: Proceedings of the 1st annual conference on Information security curriculum development, pp. 133\u2013135, 2004","DOI":"10.1145\/1059524.1059554"},{"issue":"6","key":"772_CR21","first-page":"7533","volume":"4","author":"A Koyun","year":"2017","unstructured":"Koyun, A., Janabi, E.A.: Social engineering attacks. J. Multidiscipl. Eng. Sci. Technol. (JMEST) 4(6), 7533\u20137538 (2017)","journal-title":"J. Multidiscipl. Eng. Sci. Technol. (JMEST)"},{"issue":"6","key":"772_CR22","first-page":"315","volume":"16","author":"M Workman","year":"2007","unstructured":"Workman, M.: Gaining access with social engineering: an empirical study of the threat. Inf. Syst. Secur. 16(6), 315\u2013331 (2007)","journal-title":"Inf. Syst. Secur."},{"key":"772_CR23","unstructured":"Ivaturi, K., Janczewski, L.: A taxonomy for social engineering attacks. In International Conference on Information Resources Management (CONF\u2013IRM) 2011 Proceedings (2011)"},{"key":"772_CR24","unstructured":"Theohary, C. Hoehn, J.: Convergence of cyberspace operations and electronic warfare. Technical report, Congressional Research Service (2019)"},{"issue":"2","key":"772_CR25","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5604\/23008741.1189275","volume":"7","author":"Z Haig","year":"2015","unstructured":"Haig, Z.: Electronic warfare in cyberspace. Secur. Defence Quart. 7(2), 22\u201335 (2015)","journal-title":"Secur. Defence Quart."},{"key":"772_CR26","first-page":"47","volume":"20","author":"RM Clark","year":"2013","unstructured":"Clark, R.M.: Perspectives on intelligence collection. J. US Intell. Collect. 20, 47\u201352 (2013)","journal-title":"J. US Intell. Collect."},{"key":"772_CR27","unstructured":"Richards, J.: The cyber challenge for intelligence. In Intelligence in the knowledge society. In: Proceedings of the XIXth International Conference, pp. 97\u2013108, 2014"},{"issue":"1","key":"772_CR28","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1080\/02684527.2018.1532627","volume":"34","author":"S Loleski","year":"2019","unstructured":"Loleski, S.: From cold to cyber warriors: the origins and expansion of NSA\u2019s tailored access operations (TAO) to shadow brokers. Intell. Natl. Secur. 34(1), 112\u2013128 (2019)","journal-title":"Intell. Natl. Secur."},{"issue":"6","key":"772_CR29","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1080\/02684527.2021.1899636","volume":"36","author":"RJ Aldrich","year":"2021","unstructured":"Aldrich, R.J.: From sigint to cyber: a hundred years of Britain\u2019s biggest intelligence agency. Intell. Natl. Secur. 36(6), 910\u2013917 (2021)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR30","unstructured":"Cordey, S.: The Israeli unit 8200-an OSINT-based study: Trend analysis. Technical report, ETH Zurich (2019)"},{"issue":"3","key":"772_CR31","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/gove.12309","volume":"31","author":"S Boeke","year":"2018","unstructured":"Boeke, S.: National cyber crisis management: different European approaches. Governance 31(3), 449\u2013464 (2018)","journal-title":"Governance"},{"key":"772_CR32","unstructured":"Moses, B.D.: Intelligence collection: supporting full spectrum dominance and network centric warfare? Technical report, School of Advanced Military Studies. United States Army Command and General Staff College (2004)"},{"key":"772_CR33","unstructured":"Gudgeon, J.: Looking towards the future: the changing nature of intrusive surveillance and technical attacks against high-profile targets. PhD thesis, Imperial College London (2019)"},{"issue":"2","key":"772_CR34","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1080\/02684527.2012.727070","volume":"29","author":"D Larsen","year":"2014","unstructured":"Larsen, D.: Intelligence in the first world war: the state of the field. Intell. Natl. Secur. 29(2), 282\u2013302 (2014)","journal-title":"Intell. Natl. Secur."},{"issue":"3","key":"772_CR35","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1080\/07341512.2016.1235250","volume":"32","author":"E Bruton","year":"2016","unstructured":"Bruton, E., Coleman, P.: Listening in the dark: audio surveillance, communication technologies, and the submarine threat during the first world war. Hist. Technol. 32(3), 245\u2013268 (2016)","journal-title":"Hist. Technol."},{"key":"772_CR36","unstructured":"West, N.: The SIGINT Secrets: The Signals Intelligence War, 1900 to Today: Including the Persecution of Gordon Welchman. Quill, 1988"},{"issue":"1","key":"772_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02684528608431838","volume":"1","author":"C Andrew","year":"1986","unstructured":"Andrew, C.: Codebreaking and signals intelligence. Intell. Natl. Secur. 1(1), 1\u20135 (1986)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR38","doi-asserted-by":"publisher","DOI":"10.4324\/9781315038902","volume-title":"Secrets of Signals Intelligence During the Cold War: From Cold War to Globalization","author":"MD Aid","year":"2013","unstructured":"Aid, M.D., Wiebes, C.: Secrets of Signals Intelligence During the Cold War: From Cold War to Globalization. Routledge, Boca Raton (2013)"},{"key":"772_CR39","doi-asserted-by":"publisher","DOI":"10.5040\/9798216014652","volume-title":"Signals Intelligence in World War II: a Research Guide, number 18","author":"DJ Sexton","year":"1996","unstructured":"Sexton, D.J.: Signals Intelligence in World War II: a Research Guide, number 18. Greenwood Publishing Group, Westport (1996)"},{"key":"772_CR40","volume-title":"SIGINT: The Secret History of Signals Intelligence in the World Wars","author":"P Matthews","year":"2013","unstructured":"Matthews, P.: SIGINT: The Secret History of Signals Intelligence in the World Wars. The History Press, Cheltenham (2013)"},{"key":"772_CR41","volume-title":"Secrets of Signals Intelligence During the Cold War and Beyond","author":"MM Aid","year":"2001","unstructured":"Aid, M.M., Wiebes, C.: Secrets of Signals Intelligence During the Cold War and Beyond. Psychology Press, London (2001)"},{"issue":"1","key":"772_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/714002838","volume":"16","author":"MM Aid","year":"2001","unstructured":"Aid, M.M., Wiebes, C.: Introduction on the importance of signals intelligence in the Cold War. Intell. Natl. Secur. 16(1), 1\u201326 (2001)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR43","first-page":"305","volume-title":"The Routledge Handbook of the Cold War","author":"B de Jong","year":"2014","unstructured":"de Jong, B.: Intelligence and the cold war. In: The Routledge Handbook of the Cold War, pp. 305\u2013319. Routledge, Boca Raton (2014)"},{"key":"772_CR44","doi-asserted-by":"crossref","unstructured":"Ball, D. et al.: Soviet signals intelligence (SIGINT). Strategic and Defence Studies Centre, Research School of Pacific, Canberra (1989)","DOI":"10.1080\/02684528908432022"},{"issue":"4","key":"772_CR45","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1080\/02684528908432022","volume":"4","author":"D Ball","year":"1989","unstructured":"Ball, D., Windrem, R.: Soviet signals intelligence (SIGINT): organization and management. Intell. Natl. Secur. 4(4), 621\u2013659 (1989)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR46","unstructured":"Ball, D.: Soviet SIGINT: Hawaii Operation. Strategic and Defence Studies Centre, Research School of Pacific (1991)"},{"key":"772_CR47","doi-asserted-by":"publisher","DOI":"10.4324\/9780203043615","volume-title":"Soviet Military Intelligence in War","author":"CDM Glantz","year":"2013","unstructured":"Glantz, C.D.M.: Soviet Military Intelligence in War. Routledge, Boca Raton (2013)"},{"issue":"12","key":"772_CR48","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/JPROC.2021.3084438","volume":"109","author":"K-O Widman","year":"2021","unstructured":"Widman, K.-O., Wik, A.: Swedish cryptology II. Proc. IEEE 109(12), 1942\u20131951 (2021)","journal-title":"Proc. IEEE"},{"key":"772_CR49","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/B978-044451608-4\/50018-3","volume-title":"The History of Information Security","author":"MM Aid","year":"2007","unstructured":"Aid, M.M.: Eavesdroppers of the Kremlin: KGB SIGINT during the cold war. In: The History of Information Security, pp. 497\u2013522. Elsevier, New York (2007)"},{"key":"772_CR50","unstructured":"Proctor, E.W.: The history of SIGINT in the Central Intelligence Agency, 1947\u201370. Technical report, CIA Historical Staff, 1971"},{"issue":"1","key":"772_CR51","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/714002843","volume":"16","author":"R Faligot","year":"2001","unstructured":"Faligot, R.: France, Sigint and the cold war. Intell. Natl. Secur. 16(1), 177\u2013208 (2001)","journal-title":"Intell. Natl. Secur."},{"issue":"3","key":"772_CR52","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1080\/08850600903565928","volume":"23","author":"P Hayez","year":"2010","unstructured":"Hayez, P.: \u201crenseignement\u2019\u2019: The new french intelligence policy. Int. J. Intell. Counterintell. 23(3), 474\u2013486 (2010)","journal-title":"Int. J. Intell. Counterintell."},{"issue":"4","key":"772_CR53","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1080\/0268452042000327528","volume":"19","author":"M Rudner","year":"2004","unstructured":"Rudner, M.: Britain betwixt and between: UK Sigint alliance strategy\u2019s transatlantic and European connections. Intell. Natl. Secur. 19(4), 571\u2013609 (2004)","journal-title":"Intell. Natl. Secur."},{"issue":"1","key":"772_CR54","first-page":"85","volume":"25","author":"SD Pepper","year":"2010","unstructured":"Pepper, S.D.: The business of Sigint: the role of modern management in the transformation of GCHQ. Public Policy Admin. 25(1), 85\u201397 (2010)","journal-title":"Public Policy Admin."},{"key":"772_CR55","volume-title":"GCHQ: The Secret Wireless War, 1900\u20131986","author":"N West","year":"2020","unstructured":"West, N.: GCHQ: The Secret Wireless War, 1900\u20131986. Pen and Sword, Barnsley (2020)"},{"issue":"2","key":"772_CR56","first-page":"33","volume":"55","author":"CR Moran","year":"2011","unstructured":"Moran, C.R.: The pursuit of intelligence history: methods, sources, and trajectories in the united kingdom. Stud. Intell. 55(2), 33\u201355 (2011)","journal-title":"Stud. Intell."},{"issue":"1","key":"772_CR57","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1080\/16161262.2006.10555125","volume":"6","author":"M Rudner","year":"2006","unstructured":"Rudner, M.: The historical evolution of Canada\u2019s foreign intelligence capability: cold war Sigint strategy and its legacy. J. Intell. Hist. 6(1), 67\u201383 (2006)","journal-title":"J. Intell. Hist."},{"issue":"4","key":"772_CR58","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/02684520701640449","volume":"22","author":"M Rudner","year":"2007","unstructured":"Rudner, M.: Canada\u2019s communications security establishment, signals intelligence and counter-terrorism. Intell. Natl. Secur. 22(4), 473\u2013490 (2007)","journal-title":"Intell. Natl. Secur."},{"issue":"2","key":"772_CR59","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1080\/16161262.2014.906147","volume":"13","author":"DI Chambers","year":"2014","unstructured":"Chambers, D.I.: A \u2018lantern in the dark night\u2019: the origins and early development of China\u2019s Sigint service. J. Intell. Hist. 13(2), 204\u2013222 (2014)","journal-title":"J. Intell. Hist."},{"key":"772_CR60","unstructured":"Ball, D. et al.: Signals Intelligence (SIGINT) in South Asia: India, Pakistan, Sri Lanka. Strategic and Defence Studies Centre, Research School of Pacific, Canberra (1996)"},{"issue":"3","key":"772_CR61","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/02684529508432309","volume":"10","author":"D Ball","year":"1995","unstructured":"Ball, D.: Signals intelligence in India. Intell. Natl. Secur. 10(3), 377\u2013407 (1995)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR62","unstructured":"Ball, D. et al.: Signals Intelligence (SIGINT) in South Korea. Strategic and Defence Studies Centre, Research School of Pacific, Canberra (1995)"},{"issue":"1","key":"772_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08850607.2018.1488501","volume":"32","author":"KL Lasoen","year":"2019","unstructured":"Lasoen, K.L.: Belgian intelligence SIGINT operations. Int. J. Intell. Counterintell. 32(1), 1\u201329 (2019)","journal-title":"Int. J. Intell. Counterintell."},{"issue":"2","key":"772_CR64","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1080\/08850609808435369","volume":"11","author":"BB Fischer","year":"1998","unstructured":"Fischer, B.B.: \u201cOne of the biggest ears in the world:\u2019\u2019 East German Sigint operations. Int. J. Intell. Counterintell. 11(2), 142\u2013153 (1998)","journal-title":"Int. J. Intell. Counterintell."},{"issue":"2","key":"772_CR65","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1080\/01611194.2014.885802","volume":"38","author":"J Bury","year":"2014","unstructured":"Bury, J.: Pinpointing the mark: on the Cold War SIGINT capability. Cryptologia 38(2), 147\u2013151 (2014)","journal-title":"Cryptologia"},{"key":"772_CR66","unstructured":"Ball, D., Robinson, B., Tanter, R.: Management of operations at pine gap. Technical report, Nautilus Institute for Security and Sustainability (2015)"},{"key":"772_CR67","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-319-28666-2_2","volume-title":"Industrial Espionage and Technical Surveillance Counter Measurers","author":"I Androulidakis","year":"2016","unstructured":"Androulidakis, I., Kioupakis, F.-E.: Intercepting ambient conversations. In: Industrial Espionage and Technical Surveillance Counter Measurers, pp. 11\u201321. Springer, Cham (2016)"},{"key":"772_CR68","unstructured":"Russell, E.R.: The capabilities of the US government to collect and analyze economic intelligence. Technical report, United States Army Command and General Staff College (1994)"},{"key":"772_CR69","first-page":"35","volume-title":"The French Intelligence Services","author":"G Segell","year":"2009","unstructured":"Segell, G.: The French Intelligence Services, pp. 35\u201355. Springer, Cham (2009)"},{"key":"772_CR70","volume-title":"Business Espionage: Risks, Threats, and Countermeasures","author":"B Wimmer","year":"2015","unstructured":"Wimmer, B.: Business Espionage: Risks, Threats, and Countermeasures. Butterworth-Heinemann, Oxford (2015)"},{"key":"772_CR71","unstructured":"Miller, G.: The Intelligence Coup of the Century. Washington Post, 11, 2020"},{"issue":"5","key":"772_CR72","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1080\/02684527.2020.1774849","volume":"35","author":"RJ Aldrich","year":"2020","unstructured":"Aldrich, R.J., M\u00fcller, P.F., Ridd, D., Schmidt-Eenboom, E.: Operation Rubicon: sixty years of German\u2013American success in signals intelligence. Intell. Natl. Secur. 35(5), 603\u2013607 (2020)","journal-title":"Intell. Natl. Secur."},{"issue":"5","key":"772_CR73","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1080\/02684527.2020.1774852","volume":"35","author":"MJ Dobson","year":"2020","unstructured":"Dobson, M.J.: Operation Rubicon: Germany as an intelligence \u2018great power\u2019? Intell. Natl. Secur. 35(5), 608\u2013622 (2020)","journal-title":"Intell. Natl. Secur."},{"issue":"5","key":"772_CR74","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1080\/02684527.2020.1774853","volume":"35","author":"J Dymydiuk","year":"2020","unstructured":"Dymydiuk, J.: Rubicon and revelation: the curious robustness of the \u2018secret\u2019cia-bnd operation with crypto ag. Intell. Natl. Secur. 35(5), 641\u2013658 (2020)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR75","unstructured":"Hoffman, F.: Industrial internet of things vulnerabilities and threats: What stakeholders need to consider. Issues Inf. Syst. 20(1) (2019)"},{"key":"772_CR76","unstructured":"Dittrich, D.: On the development of computer network attack capabilities. Technical report, National Research Council (2008)"},{"key":"772_CR77","unstructured":"Slavin, J.: Close access information operations. Technical report, US Army War College, Carlisle Barracks, PA, USA (2000)"},{"key":"772_CR78","doi-asserted-by":"crossref","unstructured":"Edgar, J.L.: The role of special operations forces in information warfare: Enablers, not cyber warriors. Technical report, Naval War College (2000)","DOI":"10.21236\/ADA381914"},{"issue":"1","key":"772_CR79","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s12290-016-0395-5","volume":"15","author":"J Aro","year":"2016","unstructured":"Aro, J.: The cyberspace war: propaganda and trolling as warfare tools. Eur. View 15(1), 121\u2013132 (2016)","journal-title":"Eur. View"},{"key":"772_CR80","unstructured":"Murray, H.: Cyber requirements. Technical report, US Army Cyber Center for Excellence, September (2014)"},{"key":"772_CR81","doi-asserted-by":"crossref","unstructured":"Porche, I. III, Paul, C., Serena, C.C., Clarke, C.P., Johnson, E.-E., Herrick, D.: Tactical cyber: Building a strategy for cyber support to corps and below. Technical report, RAND Corporation (2017)","DOI":"10.7249\/RR1600"},{"key":"772_CR82","unstructured":"Rivera, R.: Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters. PhD thesis, Utica College (2018)"},{"key":"772_CR83","unstructured":"Golding, J.: Byte, with, and through: how special operations and cyber command can support each other. War on the Rocks (2022)"},{"key":"772_CR84","first-page":"63","volume":"4","author":"HS Lin","year":"2010","unstructured":"Lin, H.S.: Offensive cyber operations and the use of force. J. Natl. Secur. Law Policy 4, 63 (2010)","journal-title":"J. Natl. Secur. Law Policy"},{"key":"772_CR85","first-page":"399","volume":"31","author":"J Peagler","year":"2014","unstructured":"Peagler, J.: The stuxnet attack: a new form of warfare and the (in) applicability of current international law. Ariz. J. Int\u2019l & Comp. L. 31, 399 (2014)","journal-title":"Ariz. J. Int\u2019l & Comp. L."},{"key":"772_CR86","unstructured":"Committee on\u00a0Information Assurance\u00a0for Network-Centric Naval\u00a0Forces: Information assurance for network\u2013centric naval forces. National Academies Press (2010)"},{"key":"772_CR87","unstructured":"Lonergan, S.W.: Cyber power and the international system. PhD thesis, Columbia University (2017)"},{"issue":"3","key":"772_CR88","first-page":"122","volume":"13","author":"ED Borghard","year":"2019","unstructured":"Borghard, E.D., Lonergan, S.W.: Cyber operations as imperfect tools of escalation. Strategic Stud. Quart. 13(3), 122\u2013145 (2019)","journal-title":"Strategic Stud. Quart."},{"key":"772_CR89","volume-title":"The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations","author":"B Buchanan","year":"2016","unstructured":"Buchanan, B.: The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations. Oxford University Press, Oxford (2016)"},{"key":"772_CR90","doi-asserted-by":"crossref","unstructured":"Mell, P., Spring, J., Dugal, D., Ananthakrishna, S., Casotto, F., Fridley, T., Ganas, C., Kundu, A., Nordwall, P., Pushpanathan, V. et al.: Measuring the common vulnerability scoring system base score equation. Technical report, National Institute of Standards and Technology, Gaithersburg, MD, US (2022)","DOI":"10.6028\/NIST.IR.8409"},{"issue":"9","key":"772_CR91","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1016\/j.jss.2009.08.023","volume":"83","author":"SH Houmb","year":"2010","unstructured":"Houmb, S.H., Franqueira, V.N.L., Engum, E.A.: Quantifying security risk level from CVSS estimates of frequency and impact. J. Syst. Softw. 83(9), 1622\u20131634 (2010)","journal-title":"J. Syst. Softw."},{"key":"772_CR92","unstructured":"Mell, P., Scarfone, K., Romanosky, S. et\u00a0al.: A complete guide to the Common Vulnerability Scoring System version 2.0. Technical report, Forum of Incident Response and Security Teams (2007)"},{"key":"772_CR93","volume-title":"Research Handbook on International Law and Cyberspace","author":"R Buchan","year":"2021","unstructured":"Buchan, R., Navarrete, I.: Cyber espionage and international law. In: Research Handbook on International Law and Cyberspace. Edward Elgar Publishing, Cheltenham (2021)"},{"issue":"886","key":"772_CR94","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1017\/S1816383112000811","volume":"94","author":"H Lin","year":"2012","unstructured":"Lin, H.: Cyber conflict and international humanitarian law. Int. Rev. Red Cross 94(886), 515\u2013531 (2012)","journal-title":"Int. Rev. Red Cross"},{"key":"772_CR95","first-page":"735","volume":"48","author":"ET Jensen","year":"2016","unstructured":"Jensen, E.T.: The tallinn manual 2.0: highlights and insights. Georgetown J. Int. Law 48, 735 (2016)","journal-title":"Georgetown J. Int. Law"},{"key":"772_CR96","unstructured":"Schmitt, M.N.: Grey zones in the international law of cyberspace. Yale J. Int. Law Online (2017)"},{"key":"772_CR97","first-page":"69","volume":"01","author":"P Roguski","year":"2019","unstructured":"Roguski, P.: Overcoming the damage of disinformation. New Eastern Europe 01, 69\u201376 (2019)","journal-title":"New Eastern Europe"},{"key":"772_CR98","volume-title":"The Snowden Files: The Inside Story of the World\u2019s Most Wanted Man","author":"L Harding","year":"2014","unstructured":"Harding, L.: The Snowden Files: The Inside Story of the World\u2019s Most Wanted Man. Guardian Faber Publishing, Bloomsburg (2014)"},{"issue":"2","key":"772_CR99","doi-asserted-by":"publisher","first-page":"139","DOI":"10.24908\/ss.v13i2.5363","volume":"13","author":"D Lyon","year":"2015","unstructured":"Lyon, D.: The Snowden stakes: challenges for understanding surveillance today. Surveill. Soc. 13(2), 139\u2013152 (2015)","journal-title":"Surveill. Soc."},{"key":"772_CR100","first-page":"1679","volume":"72","author":"H Margaret","year":"2015","unstructured":"Margaret, H.: Taxonomy of the Snowden disclosures. Washington Lee Law Rev. 72, 1679 (2015)","journal-title":"Washington Lee Law Rev."},{"key":"772_CR101","unstructured":"Maass, P., Poitras, L.: Core secrets: NSA saboteurs in China and Germany. The Intercept, 11, 2014"},{"issue":"5","key":"772_CR102","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/02684527.2020.1774854","volume":"35","author":"S Mainwaring","year":"2020","unstructured":"Mainwaring, S.: Division D: operation Rubicon and the CIA\u2019s secret SIGINT empire. Intell. Natl. Secur. 35(5), 623\u2013640 (2020)","journal-title":"Intell. Natl. Secur."},{"key":"772_CR103","unstructured":"Arkin, W., Ambinder, M.: The special missions of the electron recon team. the US army technical support squadron and TAREX. The secrets machine, 2022"},{"key":"772_CR104","unstructured":"NSA\/CSS: National initiative protection program\u2014sentry eagle. Technical report, National Security Agency\/Central Security Service, (2004)"},{"key":"772_CR105","first-page":"2013","volume":"4","author":"B Gellman","year":"2013","unstructured":"Gellman, B., Soltani, A.: NSA tracking cellphone locations worldwide: snowden documents show. Wash. Post 4, 2013 (2013)","journal-title":"Wash. Post"},{"key":"772_CR106","unstructured":"Appelbaum, J.R., Horchert, J., St\u00f6cker, C.: Catalog advertises NSA toolbox. Der Spiegel, Shopping for spy gear (2013)"},{"key":"772_CR107","doi-asserted-by":"crossref","unstructured":"Guri, M., Monitz, M., Elovici, Y.: Usbee: Air-gap covert-channel via electromagnetic emission from usb. In 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 264\u2013268. IEEE (2016)","DOI":"10.1109\/PST.2016.7906972"},{"key":"772_CR108","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.vlsi.2021.03.002","volume":"79","author":"J Harrison","year":"2021","unstructured":"Harrison, J., Asadizanjani, N., Tehranipoor, M.: On malicious implants in PCBS throughout the supply chain. Integration 79, 12\u201322 (2021)","journal-title":"Integration"},{"key":"772_CR109","volume-title":"No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State","author":"G Greenwald","year":"2014","unstructured":"Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State. Macmillan, London (2014)"},{"key":"772_CR110","unstructured":"NSA\/CSS: Computer network exploitation (CNE) classification guide. Technical report, National Security Agency\/Central Security Service, (2010)"},{"key":"772_CR111","unstructured":"NSA\/CSS: Classification guide for the NSA\/CSS target exploitation (TAREX) program. Technical report, National Security Agency\/Central Security Service, (2012)"},{"key":"772_CR112","unstructured":"Steinbeck, R.: CIA & sudan. Technical report, Harvard Model Congress (2020)"},{"key":"772_CR113","doi-asserted-by":"publisher","DOI":"10.4324\/9780429494321","volume-title":"The US Intelligence Community","author":"JT Richelson","year":"2018","unstructured":"Richelson, J.T.: The US Intelligence Community. Routledge, Boca Raton (2018)"},{"key":"772_CR114","unstructured":"Samuel, H.: Chip and pin scam \u2018has netted millions from british shoppers,\u2019. The Telegraph (2008)"},{"key":"772_CR115","unstructured":"Clark, D., Berson, T., Lin, H.S.: At the nexus of cybersecurity and public policy. Computer Science and Telecommunications Board. National Research Council. The National Academies Press, Washington (2014)"},{"key":"772_CR116","unstructured":"Eichelsheim, O.: GRU close access cyber operation against OPCW. Defence Intelligence & Security Service, NL Ministry of Defence, Technical report (2018)"},{"key":"772_CR117","doi-asserted-by":"crossref","unstructured":"Egloff, F.J., Smeets, M.: Publicly attributing cyber attacks: a framework. J. Strategic Stud. pp. 1\u201332 (2021)","DOI":"10.1080\/01402390.2021.1895117"},{"key":"772_CR118","doi-asserted-by":"crossref","unstructured":"Sagers, G., Hosack, B., Rowley, R.J., Twitchell, D., Nagaraj, R.: Where\u2019s the security in wifi? An argument for industry awareness. In 2015 48th Hawaii international conference on system sciences, pages 5453\u20135461. IEEE (2015)","DOI":"10.1109\/HICSS.2015.641"},{"key":"772_CR119","doi-asserted-by":"crossref","unstructured":"Etta, V.O., Sari, A., Imoize, A.L., Shukla, P.K., Alhassan, M.: Assessment and test-case study of wi-fi security through the wardriving technique. Mobile Inf. Syst. 2022 (2022)","DOI":"10.1155\/2022\/7936236"},{"key":"772_CR120","unstructured":"Dorais-Joncas, A., Mun\u00f5z, F.: Jumping the air gap: 15 years of nation-state effort. Technical report, ESET (2021)"},{"key":"772_CR121","unstructured":"Stevens, M.W., Pope, M.: An implementation of an optical data diode. Citeseer (1999)"},{"key":"772_CR122","doi-asserted-by":"crossref","unstructured":"Rogowski, D.: Software support for common criteria security development process on the example of a data diode. In Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30\u2013July 4, 2014, Brun\u00f3w, Poland, pp. 363\u2013372. Springer (2014)","DOI":"10.1007\/978-3-319-07013-1_35"},{"key":"772_CR123","doi-asserted-by":"crossref","unstructured":"Xu, W., Tao, Y., Guan, X.: The landscape of industrial control systems (ICS) devices on the internet. In: 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/CyberSA.2018.8551422"},{"key":"772_CR124","doi-asserted-by":"crossref","unstructured":"Dodson, M., Beresford, A.R., Thomas, D.R.: When will my PLC support mirai? The security economics of large-scale attacks against internet-connected ICS devices. In: 2020 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201314. IEEE (2020)","DOI":"10.1109\/eCrime51433.2020.9493257"},{"issue":"3","key":"772_CR125","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Privacy"},{"issue":"3","key":"772_CR126","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of stuxnet. IEEE Spectr. 50(3), 48\u201353 (2013)","journal-title":"IEEE Spectr."},{"issue":"4","key":"772_CR127","doi-asserted-by":"publisher","first-page":"997","DOI":"10.3390\/sym6040997","volume":"6","author":"D Moon","year":"2014","unstructured":"Moon, D., Im, H., Lee, J.D., Park, J.H.: Mlds: multi-layer defense system for preventing advanced persistent threats. Symmetry 6(4), 997\u20131010 (2014)","journal-title":"Symmetry"},{"key":"772_CR128","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490\u20134494. IEEE (2011)","DOI":"10.1109\/IECON.2011.6120048"},{"key":"772_CR129","doi-asserted-by":"crossref","unstructured":"Jafarnejad, S., Codeca, L., Bronzi, W., Frank, R., Engel, T.: A car hacking experiment: When connectivity meets vulnerability. In 2015 IEEE globecom workshops (GC Wkshps), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/GLOCOMW.2015.7413993"},{"key":"772_CR130","unstructured":"Skorobogatov, S.P.: Semi-invasive attacks\u2014a new approach to hardware security analysis. Technical report, University of Cambridge, Computer Laboratory (2005)"},{"key":"772_CR131","doi-asserted-by":"crossref","unstructured":"Bhamidipati, P., Achyutha, S.M., Vemur, R.: Security analysis of a system-on-chip using assertion-based verification. In 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 826\u2013831. IEEE (2021)","DOI":"10.1109\/MWSCAS47672.2021.9531916"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00772-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:37:58Z","timestamp":1711525078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00772-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,3]]},"references-count":131,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["772"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00772-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,11,3]]},"assertion":[{"value":"3 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}