{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T22:42:33Z","timestamp":1778193753759,"version":"3.51.4"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529433","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:28:26Z","timestamp":1470342506000},"page":"159-173","source":"Crossref","is-referenced-by-count":5,"title":["Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods"],"prefix":"10.1109","author":[{"given":"Markus","family":"Maybaum","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE, Bonn, Germany"}]},{"given":"Jens","family":"Tolle","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Bonn, Germany"}]}],"member":"263","reference":[{"key":"ref33","author":"maybaum","year":"2016","journal-title":"Proceedings to the 15th European Conference on Cyber Warfare and Security ECCWS 2016"},{"key":"ref32","year":"2016","journal-title":"Man-in-the-Middle Trusteer web portal"},{"key":"ref31","article-title":"Trusted Control Flow Integrity","author":"maybaum","year":"2015","journal-title":"Risiken kennen Herausforderungen annehmen Losungen gestalten SecuMedia Verlag Gau-Algesheim"},{"key":"ref30","year":"2016","journal-title":"Trusted Computing &#x2013; web portal"},{"key":"ref34","article-title":"ARMing the Trusted Platform Module","author":"maybaum","year":"2015","journal-title":"Proceedings to IEEE Military Communications Conference MILCOM 2015"},{"key":"ref10","year":"2009","journal-title":"Manual on International Law Applicable to Air and Missile Warfare"},{"key":"ref11","article-title":"Definition of &#x2018;Weapon of Mass Destruction&#x2019;","author":"schneider","year":"2009","journal-title":"Schneider on Security"},{"key":"ref12","article-title":"Methods and Means of Cyber Warfare","volume":"89","author":"boothby","year":"2013","journal-title":"International Law Studies &#x2013; U S Naval War College"},{"key":"ref13","year":"1990","journal-title":"Treaty on Conventional Armed Forces in Europe"},{"key":"ref14","year":"2011","journal-title":"Vienna Document 2011"},{"key":"ref15","year":"1999","journal-title":"Agreement on Adaptation of the Treaty on Conventional Armed Forces in Europe"},{"key":"ref16","author":"today","year":"2015","journal-title":"Russia completely ending activities under Conventional Armed Forces in Europe Treaty"},{"key":"ref17","year":"2010","journal-title":"Vienna Document 1999 in Arms Control Association &#x2013; web portal"},{"key":"ref18","article-title":"Forum for Security Co-operation","year":"2016","journal-title":"OSCE web portal"},{"key":"ref19","year":"2016","journal-title":"Cyber Definitions"},{"key":"ref28","year":"2014","journal-title":"Confidence-building measures to enhance cybersecurity in focus at OSCE meeting in Vienna"},{"key":"ref4","article-title":"Obstacles and Options for Cyber Arms Controls","author":"denning","year":"0","journal-title":"Arms Control in Cyberspace Conference"},{"key":"ref27","article-title":"General Principles of International Law as Applicable in Cyberspace","author":"ziolkowski","year":"2013","journal-title":"Peacetime Regime for State Activities in Cyberspace"},{"key":"ref3","article-title":"Hybrid war &#x2013; does it even exist?","author":"van puyvelde","year":"2015","journal-title":"NATO Review magazine"},{"key":"ref6","article-title":"The World Needs New Norms on Cyberwarfare","author":"nye","year":"2015","journal-title":"Washington Post &#x2013; web portal"},{"key":"ref29","author":"nations","year":"2016","journal-title":"Biological Weapons Convention"},{"key":"ref5","article-title":"A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations","author":"arimatsu","year":"2012","journal-title":"Proceedings of the 4th International Conference on Cyber Conflct"},{"key":"ref8","article-title":"From Russia Without Love","author":"arquilla","year":"2015","journal-title":"Communications of the ACM"},{"key":"ref7","year":"2016","journal-title":"The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies &#x2013; web portal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1163\/18750230-02601001"},{"key":"ref9","article-title":"U.S. and China Seek Arms Deal for Cyberspace","author":"sanger","year":"2015","journal-title":"The New York Times"},{"key":"ref1","article-title":"Cyberwar Ignites a New Arms Race","author":"paletta","year":"2015","journal-title":"Wall Street Journal- web portal"},{"key":"ref20","author":"geers","year":"2011","journal-title":"Strategic Cyber Security"},{"key":"ref22","article-title":"The AntiVirus is Dead &#x2013; says Symantec","author":"gupta","year":"2014","journal-title":"The Windows Club Tech News &#x2013; web portal"},{"key":"ref21","year":"1992","journal-title":"Treaty on Open Skies"},{"key":"ref24","article-title":"The Chemical Weapons Convention (CWC) at a Glance","year":"2015","journal-title":"Arms Control Association &#x2013; web portal"},{"key":"ref23","year":"1997","journal-title":"Chemical Weapons Convention"},{"key":"ref26","article-title":"Responsive Cyber Defence, study & workshop presentation","author":"brangetto","year":"0","journal-title":"6th International Conference on Cyber Conflict CyCon"},{"key":"ref25","year":"2016","journal-title":"OPCW Member States"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529433.pdf?arnumber=7529433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T05:46:59Z","timestamp":1623131219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7529433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529433","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}