{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:11:19Z","timestamp":1762607479867,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/ccwc.2019.8666559","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:58:55Z","timestamp":1552953535000},"page":"0943-0949","source":"Crossref","is-referenced-by-count":11,"title":["A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks"],"prefix":"10.1109","author":[{"given":"Chuck","family":"Easttom","sequence":"first","affiliation":[]},{"given":"William","family":"Butler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.2"},{"key":"ref11","article-title":"A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence","author":"kiwia","year":"2017","journal-title":"Journal of Computational Science"},{"key":"ref12","first-page":"1","article-title":"Invesigating vulnerabilities in gsm security","author":"pannu","year":"2015","journal-title":"IEEE International Conference and Workshop on (Computing and Communication (IEMCON)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2659532.2659634"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.58"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1201\/9780203490426"},{"key":"ref16","article-title":"What approaches work best for teaching secure coding practices","author":"chung","year":"2014","journal-title":"Proceedings of the 2014 HUIC Education and STEM Conference"},{"key":"ref17","first-page":"32","article-title":"Cyber Defense Capability Model: A Foundation Taxonomy","author":"kolini","year":"2015","journal-title":"CONF-IRM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232966"},{"key":"ref19","article-title":"Attack Taxonomies and Ontologies","author":"abrek","year":"2015","journal-title":"Seminar Future Internet SS2014 Network Architectures and Services"},{"article-title":"Artificial intelligence for humans: deep learning and neural networks","year":"2015","author":"heaton","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.10.020"},{"key":"ref27","article-title":"A Model for Information Assurance: Integrated Approach","author":"maconachy","year":"2001","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy"},{"key":"ref3","first-page":"1","article-title":"Introducing stealth malware taxonomy","author":"rutkowska","year":"2006","journal-title":"COSEINC Advanced Malware Labs"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCC.2016.7496735"},{"article-title":"Data Mining: Practical machine learning tools and techniques","year":"2016","author":"witten","key":"ref29"},{"key":"ref5","first-page":"273","article-title":"Fusion of Malware and Weapons Taxonomies for Analysis","author":"liles","year":"2014","journal-title":"International Conference on Cyber Warfare and Security"},{"key":"ref8","article-title":"Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems","volume":"4","author":"pan","year":"2017","journal-title":"Int J Artif Intell Interact Multimedia"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232966"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv047"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2015.7293513"},{"key":"ref1","article-title":"Proposed classification of malware, based on obfuscation","author":"barr\u00eda","year":"2016","journal-title":"Computers"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/17524-8091"},{"key":"ref22","article-title":"An Introduction to Cyber Modeling and Simulation","volume":"88","author":"couretas","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54978-1_30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2013.784468"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2017.11.1.10"},{"key":"ref26","first-page":"191","article-title":"The role of weaponized malware in cyber conflict and espionage","author":"easttom","year":"2018","journal-title":"13th International Conference on Cyber Warfare and Security ICCWS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2013.6578789"}],"event":{"name":"2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2019,1,7]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2019,1,9]]}},"container-title":["2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8663971\/8666184\/08666559.pdf?arnumber=8666559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:37Z","timestamp":1658094517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2019.8666559","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}