{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:42:54Z","timestamp":1730342574261,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10181814","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"199-215","source":"Crossref","is-referenced-by-count":1,"title":["Zero-Day Operational Cyber Readiness"],"prefix":"10.23919","author":[{"given":"Bar\u0131\u015f Egemen","family":"\u00d6zkan","sequence":"first","affiliation":[{"name":"&#x0130;stanbul,T&#x00FC;rkiye"}]},{"given":"\u0130hsan B.","family":"Tolga","sequence":"additional","affiliation":[{"name":"Binalyze,Tallinn,Estonia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2590-x"},{"year":"2023","key":"ref12","article-title":"Cloud Migration and Remote Working Attracting New Breed of Cyber-Threat"},{"year":"2021","key":"ref15","article-title":"What Is Military Readiness?"},{"journal-title":"5 Trends for 2023","year":"2023","key":"ref14"},{"journal-title":"Applying PACE Methodology across the Full Spectrum of Modern Day Operational Deployments","year":"2021","author":"williams","key":"ref31"},{"year":"2018","key":"ref30","article-title":"National Cyber Strategy of United States of America"},{"year":"2023","key":"ref11","article-title":"What Is Cybersecurity Mesh?"},{"journal-title":"The ENISA Threat Landscape (ETL) Report","year":"2023","key":"ref10"},{"article-title":"Automated\/Autonomous Incident Response","year":"2022","author":"anastopoulos","key":"ref2"},{"journal-title":"SOC for Service Organizations Trust Services Criteria","year":"2023","key":"ref1"},{"year":"2023","key":"ref17","article-title":"ISO\/IEC Information Security Management"},{"year":"2023","key":"ref16","article-title":"COBIT ISACA Framework"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131731"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131718"},{"year":"2018","key":"ref24","article-title":"Cybersecurity Framework Version 1.1"},{"year":"2022","key":"ref23","article-title":"NATO Warfighting Capstone Concept"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1111\/1758-5899.12268"},{"year":"2023","key":"ref25","article-title":"CIS Critical Security Controls"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon51939.2021.9468295"},{"year":"2023","key":"ref22","article-title":"MITRE ATTACK"},{"journal-title":"Cyber Deterrence and Cyberwar","year":"2009","author":"libicki","key":"ref21"},{"journal-title":"United Nations Manual for the Generation and Deployment of Military and Formed Police Units to Peace Operations","year":"2021","key":"ref28"},{"key":"ref27","first-page":"75","article-title":"Basic Concepts in Cyber Warfare","volume":"3","author":"tabansky","year":"2011","journal-title":"Military and Strategic Affairs"},{"journal-title":"Reliability Availability Maintainability and Cost Rationale Report Manual","year":"2009","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599813"},{"year":"2023","key":"ref7","article-title":"What Is a Cloud-Native Application Protection Platform (CNAPP)"},{"year":"2023","key":"ref9","article-title":"Capability Development: Cyber"},{"year":"2022","key":"ref4","article-title":"Blumira&#x2019;s State of Detection & Response"},{"journal-title":"Assessing Military Cyber Maturity Strategy Institutions and Capability","year":"2022","author":"blessing","key":"ref3"},{"year":"2022","key":"ref6","article-title":"Recent Cyber Events: Considerations for Military and National Security Decision Makers"},{"year":"2020","key":"ref5","article-title":"Recent Cyber Events and Possible Implications for Armed Forces"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","start":{"date-parts":[[2023,5,30]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10181814.pdf?arnumber=10181814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:02:08Z","timestamp":1702321328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10181814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10181814","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}