{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:31:08Z","timestamp":1670409068449},"reference-count":46,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1093\/cybsec\/tyx003","type":"journal-article","created":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T13:38:46Z","timestamp":1488289126000},"source":"Crossref","is-referenced-by-count":1,"title":["Rules of engagement for cyberspace operations: a view from the USA"],"prefix":"10.1093","author":[{"given":"C.","family":"Robert Kehler","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Herbert","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Sulmeyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"286","published-online":{"date-parts":[[2017,2,28]]},"reference":[{"key":"key\n\t\t\t\t20170315153240_tyx003-B1","first-page":"233","volume-title":"The U.S. Army\/Marine Corps Counterinsurgency Field Manual","year":"2007","edition":"1st edn"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B2","first-page":"207","author":"Department of Defense. Terms and definitions: rules of engagement","year":"2010\u20132016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B3","author":"Department of Defense, Joint Publication 1-02","year":"2016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B4","first-page":"11","author":"II-Strategic Context","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B5","article-title":"Limiting the undesired impact of cyber weapons: technical requirements and policy implications","volume":"3","year":"2017","journal-title":"J Cybersecurity"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B6","first-page":"91","author":"Chapter 5, Appendix A, Standing Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B7","year":"2005"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B8","first-page":"91","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B9","volume-title":"Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities","author":"National Research Council","year":"2009"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B10","author":"Air Force Material Command","year":"20  2007"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B11","first-page":"44","author":"Transitional Cyber C2 Construct","year":"2011"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B12","first-page":"14","author":"III-Strategic Goals","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B13","year":"2012"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B14","first-page":"46","year":"2016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B15","first-page":"81","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B16","first-page":"6","volume-title":"Anticipatory Action in Self-Defence: Essence and Limits under International Law","year":"2011"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B17","first-page":"452","article-title":"Anticipatory self-defense in the cyber context","volume":"89","year":"2013","journal-title":"Int L Stud"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B18","first-page":"438","article-title":"Anticipatory self-defense in the cyber context","volume":"89","year":"2013","journal-title":"Int L Stud"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B19","first-page":"61","author":"2.4.2 Examples Where Proportionality is Reflected in Law of War Rules","year":"2016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B20","first-page":"5","author":"I-Introduction","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B21","author":"Secretary of Defense Ash Carter","year":"29  2016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B22","author":"III-Strategic Goals and IV-Implementation Objectives","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B23","author":"Center for Army Lessons Learned","year":"2007"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B24","first-page":"85.","article-title":"The cyber attack on Saudi Aramco","volume":"55","year":"2013","journal-title":"Survival"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B25","year":"26  2007"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B26","volume-title":"Toward a Safer and More Secure Cyberspace","author":"National Research Council","year":"2007"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B27","author":"International and Operational Law Department","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B28","first-page":"9","author":"Deployable Training Division of the Joint Staff J7","year":"2016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B29","first-page":"82","author":"Chapter 5, Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B30","first-page":"81","author":"Chapter 5, Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B31","first-page":"84","author":"Chapter 5, Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B32","author":"Chapter 5, Appendix A, Self Defense","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B33","first-page":"181","author":"Department of Defense. Terms and Definitions: Passive Defense","year":"2010\u20132016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B34","first-page":"1","author":"Department of Defense","year":"2010\u20132016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B35","first-page":"D-8","volume-title":"The U.S. Army\/Marine Corps Counterinsurgency Field Manual","year":"2007","edition":"1st edn."},{"key":"key\n\t\t\t\t20170315153240_tyx003-B36","first-page":"500","volume-title":"The Law of Armed Conflict-International Humanitarian Law in War","year":"2010"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B37","author":"Chapter 5, Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B38","year":"5  2010"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B39","first-page":"177","author":"Department of Defense. Terms and Definitions: Operation Plan","year":"2010\u20132016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B40","first-page":"83","author":"Department of Defense. Terms and Definitions: Executive Order","year":"2010\u20132016"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B41","author":"Joint Operation Planning, Joint Publication","year":"2011"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B42","first-page":"86","author":"Chapter 5, Rules of Engagement","year":"2015"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B43","first-page":"191","author":"II-Rules for the Use of Force for the National Guard","year":"2013"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B44","year":"8  2005"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B45","author":"Commander, U.S. 2nd Fleet Public Affairs","year":"31  2005"},{"key":"key\n\t\t\t\t20170315153240_tyx003-B46","first-page":"494","volume-title":"The Law of Armed Conflict-International Humanitarian Law in War","year":"2010"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/doi\/10.1093\/cybsec\/tyx003\/11155846\/tyx003.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T18:43:11Z","timestamp":1503600191000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/3058505\/Rules"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,28]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyx003","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,28]]}}}