{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:41:37Z","timestamp":1775745697870,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529435","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T16:28:26Z","timestamp":1470328106000},"page":"191-203","source":"Crossref","is-referenced-by-count":4,"title":["Weapons systems and cyber security - a challenging union"],"prefix":"10.1109","author":[{"given":"Robert","family":"Koch","sequence":"first","affiliation":[]},{"given":"Mario","family":"Golling","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Buying Tomorrow's Military: Options for Modernising US Defense Capital Stock","author":"kosiak","year":"2001","journal-title":"Center for Strategic and Budgetary Assessments"},{"key":"ref11","year":"0","journal-title":"Association Aging weapons systems"},{"key":"ref12","author":"goldman","year":"0","journal-title":"Fake tech gear has infiltrated the USgovernment"},{"key":"ref13","article-title":"Information Age Transformation: Getting to a 21st Century Military (revised)","author":"alberts","year":"2002","journal-title":"DTIC Document Tech Rep"},{"key":"ref14","article-title":"Network centric operations: background and oversight issues for congress","author":"wilson","year":"2007","journal-title":"DTIC Document"},{"key":"ref15","article-title":"Adjusting to a new security environment: The defense technology and industrial base challenge &#x2013; background paper","author":"slocombe","year":"1991","journal-title":"Tech Rep"},{"key":"ref16","article-title":"A strategy for the European defence technological and industrial base","year":"2007","journal-title":"Tech Rep"},{"key":"ref17","article-title":"World electronic industries 2012&#x2013;2017","author":"publications","year":"2014","journal-title":"Tech Rep"},{"key":"ref18","article-title":"Compromised by design? securing the defense electronics supply chain","author":"villasenor","year":"2013","journal-title":"Brookings Institution Report"},{"key":"ref19","article-title":"How to manipulate curve standards: a white paper for the black hat","author":"bernstein","year":"2014","journal-title":"Cryptology ePrint Archive Report 2014\/571 Tech Rep"},{"key":"ref4","article-title":"Counterfeit parts &#x2013; DOD needs to improve reporting and oversight to reduce supply chain risk","author":"mak","year":"0","journal-title":"Tech Rep 2016 gAO-16-236 Report to Congressional Committees"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/09574091211289200"},{"key":"ref3","author":"mick","year":"0","journal-title":"US GOA [sic ] 40 Percent of Defense Supply Chain Damaged by Chinese Parts"},{"key":"ref6","author":"skorobogatov","year":"2012","journal-title":"Breakthrough silicon scanning discovers back door in military chip Springer"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-642-40349-1_12","article-title":"Stealthy dopant-level hardware Trojans","author":"becker","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2013"},{"key":"ref8","author":"freund","year":"0","journal-title":"Totalschaden mit Ansage"},{"key":"ref7","author":"arthur","year":"0","journal-title":"Cyber-attack concerns raised over Boeing 787 chip's &#x2018;back door&#x2019;"},{"key":"ref2","author":"ortiz","year":"0","journal-title":"Dod trusted foundry program"},{"key":"ref9","article-title":"2016 index of US. military strength","author":"wood","year":"2015","journal-title":"Tech Rep"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref20","first-page":"1","article-title":"Designing and implementing malicious hardware","volume":"8","author":"king","year":"2008","journal-title":"LEET"},{"key":"ref22","article-title":"Remaking American security: Supply chain vulnerabilities & national security risks across the US defense industrial base","author":"adams","year":"2013","journal-title":"Alliance for American Manufacturing"},{"key":"ref21","author":"dignan","year":"0","journal-title":"Counterfeit Chips A $169 Billion Tech Supply Chain Headache"},{"key":"ref24","year":"2004","journal-title":"Directive 2004\/108\/EC of the European Parliament and of the Council of 15 December 2004 on the Approximation of the Laws of the Member States Relating to Electromagnetic Compatibility and Repealing Directive 89\/336\/EEC"},{"key":"ref23","article-title":"Directive 1999\/5\/ec of the european parliament and of the council of 9 march 1999 on radio equipment and telecommunications terminal equipment and the mutual recognition of their conformity","year":"1999"},{"key":"ref26","year":"0","journal-title":"COBIT 5 for Risk Isaca 2013 ASIN B01A1MXZ30"},{"key":"ref25","author":"b\u00f6ck","year":"0","journal-title":"Juniper wegen Hintert&#x00FC;ren in Erkl&#x00E4;rungsnot"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529435.pdf?arnumber=7529435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:59:03Z","timestamp":1498319943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529435","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}