{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T11:49:18Z","timestamp":1750074558215,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/cycon.2014.6916410","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T17:36:10Z","timestamp":1412789770000},"page":"303-327","source":"Crossref","is-referenced-by-count":9,"title":["Fighting power, targeting and cyber operations"],"prefix":"10.1109","author":[{"given":"Paul","family":"Ducheine","sequence":"first","affiliation":[]},{"given":"Jelle","family":"van Haaster","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2000","author":"gibson","journal-title":"No Maps for These Territories","key":"35"},{"year":"2012","journal-title":"The Defence Cyber Strategy","key":"36"},{"year":"0","journal-title":"Conceptual Views on the Activities of the Armed Forces of the Russian Federation in the Information Space","key":"33"},{"key":"34","first-page":"309","article-title":"Cyber war and international law: Does the international legal process constitute a threat to U.S. Vital interests","author":"murphy","year":"2013","journal-title":"United States Naval War College International Law Studies"},{"year":"2006","author":"pfleeger","journal-title":"Security in Computing 4th Ed","key":"39"},{"year":"2013","journal-title":"Netherlands Defence Doctrine","key":"37"},{"year":"2010","journal-title":"NATO Standardization Agency","key":"38"},{"year":"2003","author":"puri","journal-title":"Bots & Botnet An Overview","key":"43"},{"year":"2010","journal-title":"Attacks by 'Anonymous' WikiLeaks Proponents Not Anonymous","key":"42"},{"year":"0","key":"41"},{"key":"40","first-page":"390","volume":"7","author":"lamb","year":"0","journal-title":"Plato with An English Translation"},{"key":"22","first-page":"15","volume":"1","author":"ianelli","year":"2005","journal-title":"Botnets as a Vehicle for Online Crime"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1017\/S1062798705000189"},{"year":"2008","author":"janczewski","journal-title":"Cyber Warfare and Cyber Terrorism Hershey Information Science Reference","key":"24"},{"key":"25","first-page":"198","article-title":"Cyber attacks: Proportionality and precautions in attack","author":"jensen","year":"2013","journal-title":"United States Naval War College International Law Studies"},{"year":"0","author":"kovacs","journal-title":"DDOS Attack on DigiD Impacts 10 Million Dutch Users","key":"26"},{"year":"0","author":"liphshiz","journal-title":"Israeli Vice Prime Minister's Facebook Twitter Accounts Hacked","key":"27"},{"year":"2009","author":"namestnikov","journal-title":"The Economics of Botnets","key":"28"},{"key":"29","first-page":"252","article-title":"Lawful targets in cyber operations-Does the principle of distinction apply","author":"lubell","year":"2013","journal-title":"United States Naval War College International Law Studies"},{"year":"2014","author":"andress","journal-title":"Cyber Warfare Techniques Tactics and Tools for Security Practitioners 2nd Ed","key":"3"},{"year":"2011","author":"andress","journal-title":"Cyber Warfare Techniques and Tools for Security Practitioners 1st Ed","key":"2"},{"year":"2009","author":"allen","journal-title":"Citizen Journalism Global Perspectives","key":"1"},{"year":"2010","journal-title":"Shrivenham Development","key":"7"},{"key":"30","first-page":"4","author":"mansfield-devine","year":"2011","journal-title":"Anonymous Serious Threat or Mere Annoyance"},{"key":"6","first-page":"424","volume":"51","author":"betz","year":"2011","journal-title":"Cyberspace and the State Adelphi Series"},{"year":"0","author":"bell","journal-title":"Sohaib Athar's Tweets from the Attack on Osama Bin Laden","key":"5"},{"year":"2000","author":"miller","journal-title":"The Internet An ethnographic approach","key":"32"},{"year":"2010","author":"antoci","journal-title":"See You on Facebook The Effect of Social Networking on Human Interaction","key":"4"},{"year":"0","author":"matlack","journal-title":"Cyberwar in Ukraine Falls Far Short of Russia's Full Powers","key":"31"},{"year":"2010","author":"cornish","journal-title":"On Cyber Warfare","key":"9"},{"year":"1976","author":"von","journal-title":"On War","key":"8"},{"key":"59","first-page":"69","article-title":"Lawfare","volume":"106","author":"voetelink","year":"2013","journal-title":"Militair Rechtelijk Tijdschrift"},{"year":"2011","journal-title":"Department of Defense Strategy for Operating in Cyberspace","key":"58"},{"year":"2006","journal-title":"Counterinsurgency","key":"57"},{"year":"2010","journal-title":"Cyberspace Operations Concept Capability Plan 2016-2028","key":"56"},{"year":"1984","author":"gibson","journal-title":"Neuromancer","key":"19"},{"year":"0","journal-title":"Air Force Pamphlet 14-210 Intelligence Targeting Guide","key":"55"},{"year":"0","author":"gertz","journal-title":"User Suspended Twitter Blocks Multiple Accounts of Somali Al-Qaeda Group during Kenya Attack","key":"17"},{"key":"18","first-page":"72","article-title":"Burning chrome","author":"gibson","year":"1982","journal-title":"Omni"},{"year":"0","author":"eijndhoven","journal-title":"On Dutch Banking Woes and DDoS Attacks","key":"15"},{"year":"0","journal-title":"Windows Exploits","key":"16"},{"key":"13","first-page":"146","article-title":"Lawfare today: A perspective","volume":"3","author":"dunlap","year":"2008","journal-title":"Yale Journal of International Affairs"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1093\/acprof:oso\/9780199231911.001.0001"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1002\/bltj.20298"},{"key":"12","first-page":"11","author":"di marzio","year":"2009","journal-title":"The Targeting Process This Unknown Process (Part 1)"},{"key":"21","article-title":"Shopping for zero-Days: A price list for hackers' Secret software exploits","author":"greenberg","year":"0","journal-title":"Forbes"},{"key":"20","first-page":"438","article-title":"Anticipatory self-Defense in the cyber context","volume":"89","author":"gill","year":"2013","journal-title":"United States Naval War College International Law Studies"},{"key":"62","article-title":"Politics as a vocation","author":"weber","year":"1918","journal-title":"From Max Weber Essays in Sociology"},{"year":"0","author":"wyler","journal-title":"AP Twitter Hacked Claims Barack Obama Injured in White House Explosions","key":"63"},{"year":"2007","author":"vogt","journal-title":"Army of Botnets","key":"60"},{"key":"61","first-page":"341","article-title":"Organizing for cyberspace operations: Selected issues","author":"walker","year":"2013","journal-title":"United States Naval War College International Law Studies"},{"key":"49","article-title":"Blackhole botnet creator buys up zero day exploits","author":"schwartz","year":"0","journal-title":"Information Week"},{"key":"48","article-title":"The law of cyber warfare: Quo vadis","volume":"25","author":"schmitt","year":"2014","journal-title":"Stanford Law and Policy Review"},{"year":"0","journal-title":"Ukrainian Authorities Suffer New Cyber Attacks","key":"45"},{"year":"0","journal-title":"The Attacker's Playbook Test Your Network to Uncover Exploitable Security Gaps with Metasploit","key":"44"},{"doi-asserted-by":"publisher","key":"47","DOI":"10.1017\/CBO9781139169288"},{"year":"1993","author":"rheingold","journal-title":"The Virtual Community Homesteading on the Electronic Frontier","key":"46"},{"year":"0","author":"corrin","journal-title":"The Other Syria Debate Cyber Weapons","key":"10"},{"year":"2006","journal-title":"The National Military Strategy for Cyberspace Operations","key":"51"},{"year":"2007","journal-title":"Joint Targeting","key":"52"},{"year":"2004","journal-title":"A Vision for Tomorrow","key":"53"},{"year":"2000","journal-title":"Securing America's Cyberspace National Plan for Information Systems Protection An Invitation to A Dialogue","key":"54"},{"year":"0","journal-title":"Windows XP Exploits","key":"50"}],"event":{"name":"2014 6th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2014,6,3]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 6th International Conference On Cyber Conflict (CyCon 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6876058\/6916383\/06916410.pdf?arnumber=6916410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:35:39Z","timestamp":1490276139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6916410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/cycon.2014.6916410","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}