{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:09:55Z","timestamp":1771610995565,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679440","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"726-731","source":"Crossref","is-referenced-by-count":1,"title":["Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace"],"prefix":"10.1109","author":[{"given":"Nigel","family":"Davies","sequence":"first","affiliation":[{"name":"Bournemouth University,Faculty of Science and Technology,Bournemouth,UK"}]},{"given":"Huseyin","family":"Dogan","sequence":"additional","affiliation":[{"name":"Bournemouth University,Faculty of Science and Technology,Bournemouth,UK"}]},{"given":"Duncan","family":"Ki-Aries","sequence":"additional","affiliation":[{"name":"Bournemouth University,Faculty of Science and Technology,Bournemouth,UK"}]},{"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Bournemouth University,Faculty of Science and Technology,Bournemouth,UK"}]},{"given":"Chris","family":"Williams","sequence":"additional","affiliation":[{"name":"DSTL,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Blurring the Lines: The Overlap Between Cyber and Electronic Warfare","author":"Thompson","year":"October 2023","journal-title":"Journal of Electromagnetic Dominance"},{"key":"ref2","volume-title":"Gray Hat Hacking","author":"Regalado","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9625-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100672"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.7274"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/sym12122107"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2013.2272944"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256318"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5194\/ars-14-91-2016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2017.2682643"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2019.2925712"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/hci2018.158"},{"key":"ref14","volume-title":"A discourse on winning and losing","author":"Boyd","year":"1987"},{"key":"ref15","article-title":"The Dynamic OODA Loop: Amalgamating Boyds OODA Loop and the Cybernetic Approach to Command and Control ASSESSMENT, TOOLS AND METRICS","volume-title":"10th International Command and Control Research and Technology Symposium. The Future of C2","author":"Brehmer"},{"key":"ref16","article-title":"Personas \u2013 A Simple Introduction","volume-title":"Interaction Design Foundation","author":"Dam","year":"14 2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00847-5_11"},{"key":"ref19","volume-title":"UFO","year":"14 2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2010.515313"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2005.1571630"},{"key":"ref22","article-title":"Systems of Systems Characterization and Types","author":"Dahmann","year":"2015"},{"issue":"10","key":"ref23","first-page":"50","article-title":"Direct and Indirect Interactions","volume":"3","author":"Moon","year":"2010","journal-title":"Nature Education Knowledge"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083806"},{"key":"ref25","article-title":"Open Government Licence for Public Sector Information","year":"16 2024"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679440.pdf?arnumber=10679440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:23:41Z","timestamp":1727241821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679440","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}