{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:41:38Z","timestamp":1765356098915,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529432","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T16:28:26Z","timestamp":1470328106000},"page":"141-158","source":"Crossref","is-referenced-by-count":13,"title":["Conceptualising cyber arms races"],"prefix":"10.1109","author":[{"given":"Anthony","family":"Craig","sequence":"first","affiliation":[]},{"given":"Brandon","family":"Valeriano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Iranian Internet and Infrastructure Policy Report","year":"2014","author":"media","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/2009738"},{"journal-title":"Confront and Conceal Obama's Secret Wars and Surprising Use of American Power","year":"2012","author":"sanger","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/0022343397034001002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2012.664354"},{"journal-title":"Arms and Insecurity A Mathematical Study of the Causes and Origins of War","year":"1960","author":"richardson","key":"ref30"},{"key":"ref37","article-title":"Iran strengthened cyber capabilities after Stuxnet: US General","author":"shalal-esa","year":"2013","journal-title":"Reuters"},{"key":"ref36","article-title":"Iran Now a &#x2018;Top Threat&#x2019; to US Networks, Spy Chief Claims","author":"shachtman","year":"2012","journal-title":"Wired"},{"key":"ref35","article-title":"South Korea Develops National Cyber Security Strategy","author":"schweber","year":"2011","journal-title":"Intelligence"},{"key":"ref34","article-title":"Computer Networks in South Korea Are Paralyzed in Cyberattacks","author":"sang-hun","year":"2013","journal-title":"The New York Times"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0022343305050687"},{"journal-title":"Iranian Internet and Infrastructure Policy Report","year":"2015","author":"media","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.polisci.3.1.251"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2539240"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/2009706"},{"key":"ref14","article-title":"NSA Claims Iran Learned from Western Cyberattacks","author":"greenwald","year":"2015","journal-title":"Interceptors"},{"key":"ref15","first-page":"1840","author":"hammond","year":"1992","journal-title":"Plowshares into Swords Arms Races in International Politics"},{"key":"ref16","article-title":"Profiling an enigma: The mystery of North Korea's cyber threat landscape","author":"packard","year":"2014","journal-title":"HP Security Briefing Episode 16"},{"article-title":"Arms Races and the International System","year":"1987","author":"horn","key":"ref17"},{"journal-title":"Joint Hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies","article-title":"Iranian Cyber Threat to the U.S Homeland","year":"2012","key":"ref18"},{"key":"ref19","first-page":"1","article-title":"Arms Races: Prerequisites and Results","volume":"8","author":"huntington","year":"1958","journal-title":"Public Policy"},{"key":"ref28","article-title":"North Korea Complains of Cyberattacks","author":"nam","year":"2013","journal-title":"The Wall Street Journal"},{"journal-title":"Congressional Research Service Reports on Homeland Security","year":"2015","key":"ref4"},{"key":"ref27","article-title":"How North Korea built up a cadre of code warriors prepared for cyberwar","author":"mulrine","year":"2015","journal-title":"Christian Science Monitor"},{"journal-title":"Cyber War The next Threat to National Security and What to Do about It","year":"2010","author":"clarke","key":"ref3"},{"year":"2014","key":"ref6","article-title":"Operation Cleaver"},{"journal-title":"POWER FOR THE FUTURE","year":"2011","author":"nye","key":"ref29"},{"key":"ref5","article-title":"Rapid escalation of the cyber-arms race","author":"corera","year":"2015","journal-title":"BBC News"},{"key":"ref8","article-title":"Cyber Command's exploding budget in 1 chart","author":"fung","year":"2014","journal-title":"The Washington Post"},{"key":"ref7","article-title":"Case Study and Theory in Political Science","author":"eckstein","year":"1975","journal-title":"Handbook of Political Science"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7736.001.0001","author":"choucri","year":"2012","journal-title":"Cyber Politics in International Relations"},{"journal-title":"Case Studies and Theory Development in the Social Sciences","year":"2005","author":"george","key":"ref9"},{"key":"ref1","article-title":"Panetta Warns of Dire Threat of Cyberattack on U.S","author":"bumiller","year":"2012","journal-title":"The New York Times"},{"key":"ref46","article-title":"Conceptualising and Measuring Rapid Military Buildups in the International System","author":"valeriano","year":"2013","journal-title":"Eurasian Peace Science Conference"},{"journal-title":"Perception and Misperception in International Politics","year":"1976","author":"jervis","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001"},{"key":"ref48","article-title":"Cyber attackers target South Korea and US","author":"weaver","year":"2009","journal-title":"The Guardian"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00138"},{"journal-title":"Secure Internet Servers (per 1 million people)","year":"0","key":"ref47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2009958"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/0020-8833.00214"},{"key":"ref24","article-title":"The Quest for Security: Alliances and Arms","author":"leeds","year":"2012","journal-title":"Guide to the Scientific Study of International Processes"},{"journal-title":"Military Expenditure Database","year":"2015","key":"ref41"},{"key":"ref23","article-title":"North Korean hackers &#x2018;could kill&#x2019;, warns key defector","author":"lee","year":"2015","journal-title":"BBC News"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1177\/0022343313518940"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2013.816122"},{"journal-title":"The Cyber Index International Security Trends and Realities","year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2012.663252"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2016,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529432.pdf?arnumber=7529432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T01:02:36Z","timestamp":1568250156000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529432","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}