{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:44:54Z","timestamp":1769017494783,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,8]]},"DOI":"10.1109\/ict60153.2023.10374068","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:34:17Z","timestamp":1703878457000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["A Comprehensive Model for Enhancing Cybersecurity Resilience and IT Governance Through Red Teaming Exercises"],"prefix":"10.1109","author":[{"given":"Semi","family":"Yulianto","sequence":"first","affiliation":[{"name":"Doctor of Computer Science, Bina Nusantara University,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Ford Lumban","family":"Gaol","sequence":"additional","affiliation":[{"name":"Doctor of Computer Science, Bina Nusantara University,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Suhono Harso","family":"Supangkat","sequence":"additional","affiliation":[{"name":"Intitute Technology Bandung,Faculty of Digital Communication and Hotel &#x0026; Tourism,Bandung,Indonesia,40116"}]},{"given":"Benny","family":"Ranti","sequence":"additional","affiliation":[{"name":"University of Indonesia,Faculty of Computer Science,Jakarta,Indonesia,10430"}]}],"member":"263","reference":[{"key":"ref1","author":"Diogenes","year":"2018","journal-title":"Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101607"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560673"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/ijcis.2020.10029173"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01436597.2020.1729729"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790190"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/puar.13028"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/9780429504044"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009748"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9780429324932"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2018.10.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/MAJ-07-2017-1595"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.2988330"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21093267"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17645\/pag.v6i2.1385"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2017-0025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2016-0088"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2020.03.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2019.1620508"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1807\/1\/012007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2020.1735690"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/12165"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.47263\/JASEM.4(1)05"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17261\/Pressacademia.2019.1165"}],"event":{"name":"2023 29th International Conference on Telecommunications (ICT)","location":"Toba, Indonesia","start":{"date-parts":[[2023,11,8]]},"end":{"date-parts":[[2023,11,9]]}},"container-title":["2023 29th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10374015\/10374030\/10374068.pdf?arnumber=10374068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:20:04Z","timestamp":1705105204000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10374068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ict60153.2023.10374068","relation":{},"subject":[],"published":{"date-parts":[[2023,11,8]]}}}