{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:19:56Z","timestamp":1760710796558,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,20]]},"DOI":"10.1109\/hpec49654.2021.9622839","type":"proceedings-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T20:57:36Z","timestamp":1638392256000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["Realizing Forward Defense in the Cyber Domain"],"prefix":"10.1109","author":[{"given":"Sandeep","family":"Pisharody","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Bernays","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Gadepally","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Kepner","sequence":"additional","affiliation":[]},{"given":"Chad","family":"Meiners","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Michaleas","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Tse","sequence":"additional","affiliation":[]},{"given":"Doug","family":"Stetson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Mathematical Foundations of the GraphBLAS","author":"kepner","year":"2016","journal-title":"2016 IEEE High Performance Extreme Computing Conference (HPEC)"},{"article-title":"New Phenomena in Large-Scale Internet Traffic","year":"2019","author":"kepner","key":"ref11"},{"key":"ref12","article-title":"Zero Botnets: An Observe-Pursue-Counter Approach","volume":"6","author":"kepner","year":"2021","journal-title":"Belfer Center Reports"},{"article-title":"DOD Dictionary of Military and Associated Terms","year":"2012","author":"gortney","key":"ref13"},{"key":"ref14","first-page":"80","article-title":"Intelligence-driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","volume":"1","author":"hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9439.003.0011","article-title":"Knowledge Sharing among Inventors: Some Historical Perspectives","author":"bessen","year":"2016","journal-title":"Revolutionizing Innovation Users Communities and Open Innovation"},{"key":"ref16","first-page":"181","article-title":"Open Design and Crowdsourcing: Maturity, Methodology and Business Models","author":"howard","year":"2012","journal-title":"DS 70 Proceedings of DESIGN 2012 the 12th International Design Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/15487733.2012.11908095"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6293-0_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW50202.2020.00046"},{"key":"ref4","article-title":"Digital Processing of Signals","author":"gold","year":"1969","journal-title":"Digital Processing of Signals"},{"article-title":"Cyberspace Solarium Commission Report","year":"2020","author":"montgomery","key":"ref3"},{"journal-title":"Discrete-Time Signal Processing","year":"1999","author":"oppenheim","key":"ref6"},{"journal-title":"Fundamentals of Statistical Signal Processing PracticalAl-gorithmDevelopment","year":"2013","author":"kay","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8757141"},{"key":"ref1","article-title":"Defend Forward and Cyber Countermeasures","author":"deeks","year":"2020","journal-title":"Ashley Deeks Defend Forward and Cyber Countermeasures Hoover Working Group on National Security Technology and Law Aegis Series Paper no 2004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2009.5282288"},{"year":"0","key":"ref20","article-title":"GraphBLAS Repo"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1080\/02684527.2020.1729316","article-title":"US Cyber Strategy of Persistent Engagement & Defend Forward: Implications for the Alliance and Intelligence Collection","volume":"35","author":"smeets","year":"2020","journal-title":"Intelligence and National Security"},{"volume":"202018","article-title":"Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command","year":"2018","key":"ref21"},{"journal-title":"75 000 000 000 streaming inserts\/second using hierarchical hypersparse GraphBLAS matrices","year":"2020","author":"kepner","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916508"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286235"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916263"}],"event":{"name":"2021 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2021,9,20]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9622740\/9622741\/09622839.pdf?arnumber=9622839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T13:11:22Z","timestamp":1699881082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9622839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,20]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/hpec49654.2021.9622839","relation":{},"subject":[],"published":{"date-parts":[[2021,9,20]]}}}