{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:42:58Z","timestamp":1730342578016,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10182101","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"85-102","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine<sup>*<\/sup>"],"prefix":"10.23919","author":[{"given":"Erica D.","family":"Lonergan","sequence":"first","affiliation":[{"name":"United States Military Academy at West Point,Assistant Professor, Army Cyber Institute,West Point,NY,United States"}]},{"given":"Margaret W.","family":"Smith","sequence":"additional","affiliation":[{"name":"Irregular Warfare Initiative,Director, Cyber Project,Washington,DC,United States"}]},{"given":"Grace B.","family":"Mueller","sequence":"additional","affiliation":[{"name":"United States Military Academy at West Point,Postdoctoral Fellow, Army Cyber Institute,West Point,NY,United States"}]}],"member":"263","reference":[{"article-title":"Cyber Warfare in Ukraine Poses a Threat to the Global System","volume-title":"Financial Times","author":"Alexander","key":"ref1"},{"key":"ref2","article-title":"Ukraine\u2019s State-Owned Nuclear Power Operator Said Russian Hackers Attacked Website","volume-title":"Record","author":"Antoniuk","year":"2022"},{"key":"ref3","article-title":"A Web of Partnerships: Ukraine, Operational Collaboration, and Effective National Defense in Cyberspace","volume-title":"Atlantic Council","author":"Atkins","year":"2022"},{"key":"ref4","article-title":"Russia\u2019s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications","volume-title":"Carnegie Endowment for International Peace","author":"Bateman","year":"2022"},{"issue":"2","key":"ref5","first-page":"39","article-title":"Information War and Rethinking Phase 0","volume":"15","author":"Bebber","year":"2016","journal-title":"Journal of Information Warfare"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2017.1306396"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190665012.001.0001"},{"volume-title":"Russia\u2019s War in Ukraine: Military and Intelligence Aspects","year":"2022","key":"ref8"},{"volume-title":"Pentagon Gives a Grim Assessment of the First Stages of the Russian Invasion","year":"2022","author":"Cooper","key":"ref9"},{"year":"2022","key":"ref10","article-title":"Cyber Dimensions of the Armed Conflict in Ukraine: Quarterly Analysis Report\u2014Q3 July to September 2022"},{"volume-title":"Post-Breakup: Conti Ransomware Members Remain Dangerous","year":"2022","key":"ref11"},{"volume-title":"Resilient Military Systems and the Advanced Cyber Threat","year":"2013","key":"ref12"},{"volume-title":"Biden Has Been Presented with Options for Massive Cyberattacks against Russia","year":"2022","author":"Dilanian","key":"ref13"},{"volume-title":"Enemy Launches Hacker Attacks on the Power System","year":"2022","key":"ref14"},{"volume-title":"Once Again One of DTEK Energy Facilities Got Hit as a Result of Russian Attack. It Stopped Generating Electricity","year":"2022","key":"ref15"},{"volume-title":"The Russian Federation has carried out a #cyber attack on #DTEKGroup\u2019s #IT infrastructure. 1\/4","year":"2022","key":"ref16"},{"volume-title":"Brace for Russian Cyber-Attacks as Ukraine Crisis Deepens, Britain Says","year":"2022","author":"Faulconbridge","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00136"},{"volume-title":"Putin Does Not Need to Invade Ukraine to Get His Way","year":"2021","author":"Giles","key":"ref19"},{"key":"ref20","article-title":"The US Watches Warily for Russia-Ukraine Tensions to Spill Over","volume-title":"Wired","author":"Graff","year":"2022"},{"key":"ref21","article-title":"Russia\u2019s Sandworm Hackers Attempted a Third Blackout in Ukraine","volume-title":"Wired","author":"Greenberg","year":"2022"},{"volume-title":"Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin\u2019s Most Dangerous Hackers","year":"2019","author":"Greenberg","key":"ref22"},{"key":"ref23","article-title":"Pro-Russia Hackers Use Telegram, Github to Attack Czech Presidential Election","volume-title":"Record","author":"Greig","year":"2023"},{"key":"ref24","article-title":"Russia\u2019s Shock and Awe: Moscow\u2019s Use of Overwhelming Force against Ukraine","volume-title":"Foreign Affairs","author":"Kofman","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/0022002717737138"},{"key":"ref26","article-title":"Cyber War and Ukraine","volume-title":"CSIS","author":"Lewis","year":"2022"},{"key":"ref27","article-title":"The Cyber-Escalation Fallacy: What the War in Ukraine Reveals about State-Based Hacking","volume-title":"Foreign Affairs","author":"Lonergan","year":"2022"},{"key":"ref28","article-title":"Putin\u2019s Invasion of Ukraine Didn\u2019t Rely on Cyberwarfare. Here\u2019s Why","volume-title":"Washington Post","author":"Lonergan","year":"2022"},{"key":"ref29","article-title":"What Ukraine Shows about Cyber Defense and Partnerships","volume-title":"National Interest","author":"Lonergan","year":"2022"},{"volume-title":"DOJ Official Warms Companies \u2018Foolish\u2019 Not to Share Up Cybersecurity Amid Russia Tensions","year":"2022","author":"Mallin","key":"ref30"},{"volume-title":"Cobalt Strikes Again: UAC-0056 Continues to Target Ukraine in Its Latest Campaign","year":"2022","key":"ref31"},{"key":"ref32","article-title":"Here\u2019s What Cyber Pros Are Watching in the Ukraine Conflict","volume-title":"Washington Post","author":"Marks","year":"2022"},{"issue":"3","key":"ref33","first-page":"1","article-title":"Goodbye Cyberwar: Ukraine as a Reality Check","volume":"10","author":"Maschmeyer","year":"2022","journal-title":"CSS ETH Zurich Policy Perspectives"},{"key":"ref34","article-title":"There Is No Cyber \u2018Shock And Awe\u2019: Plausible Threats in the Ukraine Conflict","volume-title":"War on the Rocks","author":"Maschmeyer","year":"2022"},{"volume-title":"Defending Ukraine: Early Lessons from the Cyber War","year":"2022","key":"ref35"},{"volume-title":"Microsoft Digital Defense Report 2022: Illuminating the Threat Landscape and Empowering a Digital Defense","year":"2022","key":"ref36"},{"key":"ref37","article-title":"NATO Prepares for Cyber War","volume-title":"Politico","author":"Miller","year":"2022"},{"key":"ref38","article-title":"Russian Invasion of Ukraine Could Redefine Cyber Warfare","volume-title":"Politico","author":"Miller","year":"2022"},{"volume-title":"Keynote Address by NATO Secretary General Jens Stoltenberg at the NATO Cyber Defence Pledge Conference in Italy","key":"ref39"},{"volume-title":"NATO Secretary General Warns of Growing Cyber Threat","year":"2022","key":"ref40"},{"key":"ref41","article-title":"Russian Hackers Tried to Bring Down Ukraine\u2019s Power Grid to Help the Invasion","volume-title":"MIT Technology Review","author":"O\u2019Neill","year":"2022"},{"volume-title":"Russian Shelling Hits Residential Area in Ukrainian Town Near Nuclear Plant","year":"2022","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"},{"key":"ref44","article-title":"Cyber War as an Intelligence Contest","volume-title":"War on the Rocks","author":"Rovner","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2017.1288107"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2018.8405010"},{"key":"ref47","article-title":"What Impact, if Any, Does Killnet Have?","volume-title":"Lawfare","author":"Smith","year":"2022"},{"key":"ref48","article-title":"UK Firms Warned of Russian Cyberwar \u2018Spillover\u2019 from Ukraine","volume-title":"Guardian","author":"Sabbagh","year":"2022"},{"volume-title":"Joint Publication 3-0: Joint Operations","year":"2017","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190618094.001.0001"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1177\/0022343313518940"},{"key":"ref52","article-title":"In Ukraine, a \u2018Full-Scale Cyberwar\u2019 Emerges","volume-title":"Wall Street Journal","author":"Volz","year":"2022"},{"key":"ref53","article-title":"Cyber Operations in Ukraine: Russia\u2019s Unmet Expectations","volume-title":"Carnegie Endowment for International Peace","author":"Wilde","year":"2022"},{"volume-title":"What Are Putin\u2019s Intentions in Ukraine?","year":"2022","key":"ref54"},{"key":"ref55","article-title":"Preliminary Lessons in Conventional Warfighting from Russia\u2019s Invasion of Ukraine: February\u2013July 2022","volume-title":"RUSI","author":"Zabrodskyi","year":"2022"},{"volume-title":"(@VZhora)","year":"2022","author":"Zhora","key":"ref56"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","start":{"date-parts":[[2023,5,30]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10182101.pdf?arnumber=10182101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T06:43:29Z","timestamp":1712904209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10182101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":56,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10182101","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}