{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:28:09Z","timestamp":1725658089316},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131820","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Leveling Up Survey of How Nation States Leverage Cyber Operations to Even the Playing Field"],"prefix":"10.1109","author":[{"given":"Jason","family":"Ford","sequence":"first","affiliation":[{"name":"University of South Carolina Aiken,Computer Science, Engineering and Mathematics,Aiken,SC,USA"}]},{"given":"Hala Strohmier","family":"Berry","sequence":"additional","affiliation":[{"name":"University of South Carolina Aiken,Computer Science, Engineering and Mathematics,Aiken,SC,USA"}]}],"member":"263","reference":[{"article-title":"Shady Network of Fake Mossad Job Sites Targets Iranian Spies","year":"2022","author":"rawnsley","key":"ref13"},{"article-title":"Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media &#x2014; Proofpoint US","year":"2022","author":"giering","key":"ref12"},{"article-title":"The &#x201C;Kimsuky&#x201D; Operation: A North Korean APT?","year":"2013","author":"tarakanov","key":"ref15"},{"article-title":"New steps to protect customers from hacking","year":"2020","author":"burt","key":"ref14"},{"article-title":"Countering threats from North Korea","year":"2022","author":"weidemann","key":"ref20"},{"year":"2022","key":"ref11","article-title":"Exposing POLONIUM activity and infrastructure targeting Israeli organizations"},{"article-title":"ESET APT Activity Report T2 2022","year":"2022","author":"boutin","key":"ref10"},{"article-title":"Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations","year":"2017","author":"carr","key":"ref2"},{"article-title":"Cybercrime To Cost The World $10.5 Trillion Annually By 2025","year":"2020","author":"morgan","key":"ref1"},{"article-title":"How North Korean APT Kimsuky Is Evolving Its Tactics","year":"2021","author":"sheridan","key":"ref17"},{"article-title":"Kimsuky APT continues to target South Korean government using AppleSeed backdoor","year":"2021","author":"jazi","key":"ref16"},{"year":"2022","author":"eaton","key":"ref19"},{"article-title":"Triple Threat: North Korea-Aligned TA406 Scams, Spies, and Steals &#x2014; Proofpoint US","year":"2021","author":"huss","key":"ref18"},{"article-title":"Fake or Fake: Keeping up with OceanLotus decoys","year":"2019","author":"dumont","key":"ref8"},{"article-title":"Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage","year":"2020","author":"henderson","key":"ref7"},{"article-title":"The History of Stuxnet: The World&#x2019;s First True Cyberweapon","year":"2016","author":"franceschi-bicchierai","key":"ref9"},{"year":"2019","key":"ref4","article-title":"Threat Spotlight: Ratsnif - New Network Vermin from OceanLotus"},{"key":"ref3","article-title":"CyberSafari: Underexamined threat actors from the global threat landscape [Video]","author":"miller","year":"2020","journal-title":"YouTube"},{"article-title":"The chilling effects of malware","year":"2010","author":"mehta","key":"ref6"},{"article-title":"Vietnamese Malware Gets Very Personal","year":"2014","author":"galperin","key":"ref5"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2023,5,11]]},"location":"Chattanooga, TN, USA","end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131820.pdf?arnumber=10131820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:45:54Z","timestamp":1687196754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131820","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}