{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T01:00:42Z","timestamp":1771894842104,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529425","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:28:26Z","timestamp":1470342506000},"page":"37-49","source":"Crossref","is-referenced-by-count":5,"title":["Winning and losing in cyberspace"],"prefix":"10.1109","author":[{"given":"Jason","family":"Healey","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Why Ukraine Has Already Lost The Cyberwar, Too","author":"tucker","year":"2014","journal-title":"Defense One"},{"key":"ref38","article-title":"Cyber-war: Indian hackers hack 250+ Pakistani websites after attack on Kerala govt's website","author":"singh","year":"2015","journal-title":"Zeenews"},{"key":"ref33","author":"rid","year":"2013","journal-title":"Cyber War Will Not Take Place"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6483.001.0001","author":"rattray","year":"2001","journal-title":"Strategic Warfare in Cyberspace"},{"key":"ref31","article-title":"Bank Hacking Was the Work of Iranians, Officials Say","author":"perlroth","year":"2013","journal-title":"New York Times"},{"key":"ref30","article-title":"In Cyberattack on Saudi Firms, U.S. Sees Iran Firing Back","author":"perlroth","year":"2012","journal-title":"New York Times"},{"key":"ref37","article-title":"The Estonian Cyberattacks","author":"schmidt","year":"2013","journal-title":"A Fierce Domain Conflict in Cyberspace 1986 to 2012"},{"key":"ref36","article-title":"Obama Order Sped Up Wave of CyberattacksAgainst Iran","author":"sanger","year":"2012","journal-title":"New York Times"},{"key":"ref35","article-title":"Document Reveals Growth of Cyberwarfare Between the U.S. and Iran","author":"sanger","year":"2015","journal-title":"New York Times"},{"key":"ref34","article-title":"Is Anonymous&#x2019; cyber war against ISIS working?","author":"roberts","year":"2015"},{"key":"ref10","article-title":"Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet","author":"erdbrink","year":"2012","journal-title":"New York Times"},{"key":"ref40","year":"2008","journal-title":"US China Commission 2008 Annual Report"},{"key":"ref11","article-title":"Bone-Chilling&#x201D; Research Suggests Iran Gearing Up To Avenge Stuxnet Hacks","author":"fox-brewster","year":"2014","journal-title":"Forbes com"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1162\/ISEC_a_00136","article-title":"The Myth of Cyberwar","author":"gartzke","year":"2013","journal-title":"International Security 41&#x2013;73"},{"key":"ref13","article-title":"Who's Winning the Arab-Israeli Cyber War?","author":"gambill","year":"2000"},{"key":"ref14","article-title":"Retired General: Sony cyber attack is an act of war","author":"gonzalez","year":"2014"},{"key":"ref15","author":"healey","year":"2013","journal-title":"A Fierce Domain Conflict in Cyberspace 1986 to 2012"},{"key":"ref16","article-title":"Concluding Assessment","author":"healey","year":"2013","journal-title":"A Fierce Domain Conflict in Cyberspace 1986 to 2012"},{"key":"ref17","article-title":"NATOs Cyber Capabilities: Yesterday, Today and Tomorrow","author":"healey","year":"2014","journal-title":"Issue Brief"},{"key":"ref18","article-title":"Saudi Aramco Cyber Attacks a 'wake-up call, Says Former NSA Boss","year":"2014"},{"key":"ref19","year":"2013","journal-title":"Report on the Commission on the Theft of American Intellectual Property"},{"key":"ref28","article-title":"Cyber wars: Pak has an advantage over India","author":"nanjappa","year":"2010","journal-title":"Rediff"},{"key":"ref4","article-title":"Putin in veiled attack on Estonia","year":"2007"},{"key":"ref27","article-title":"For NSA chief, terrorist threat drives passion to &#x201C;collect it all","author":"nakashima","year":"2013","journal-title":"Washington Post"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2013.787735"},{"key":"ref6","article-title":"Panetta Warns of Dire Threat of Cyberattack on U.S","author":"bumiller","year":"2012","journal-title":"New York Times"},{"key":"ref29","author":"nye","year":"2010","journal-title":"Cyber Power Harvard Kennedy Schook"},{"key":"ref5","article-title":"Iran launches cyber offensive after nuclear deal","author":"bennett","year":"2015","journal-title":"Thellill com"},{"key":"ref8","article-title":"War in the fifth domain","year":"2010","journal-title":"The Economist"},{"key":"ref7","year":"2015","journal-title":"Winning the Cyber War"},{"key":"ref2","author":"alexander","year":"2013","journal-title":"interview by Jason Healey"},{"key":"ref9","article-title":"Paper Cuts","year":"2012","journal-title":"The Economist"},{"key":"ref1","article-title":"interview by Christopher Joye. 2014. 'Interview transcript: former head of the NSA and commander of the US cyber command, General Keith Alexander","author":"alexander","year":"0","journal-title":"Financial Review"},{"key":"ref20","author":"kay","year":"2015","journal-title":"How to Win the Cyber War"},{"key":"ref22","author":"kuehl","year":"2009","journal-title":"Cyberspace and the 'First Battle 'in 21st Century War"},{"key":"ref21","article-title":"How small states prepare for cyber-war","author":"khanna","year":"2015","journal-title":"CNN com"},{"key":"ref42","year":"2013","journal-title":"Joint Publication 3&#x2013;12 Cyberspace Operations"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2013.816122"},{"key":"ref41","year":"2015","journal-title":"US China Commission 2015 Annual Report"},{"key":"ref23","article-title":"From cyberspace to cyberpower: Defining the problem","author":"kuehl","year":"2009","journal-title":"Cyberpower and National Security"},{"key":"ref44","author":"zetter","year":"2014","journal-title":"Countdown to Zero Day Stuxnet and the Launch of the World's First Digital Weapon"},{"key":"ref26","article-title":"U.S. rallied multinational response to 2012 cyberattack on American banks","author":"nakashima","year":"2014","journal-title":"Washington Post"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001"},{"key":"ref25","article-title":"Estonia: Attacks seen as first case of &#x201C;cyberwar","author":"mite","year":"2007"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529425.pdf?arnumber=7529425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T05:02:33Z","timestamp":1568264553000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529425","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}