{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T05:29:10Z","timestamp":1730957350255,"version":"3.28.0"},"reference-count":85,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,8]]},"DOI":"10.1109\/ict60153.2023.10374053","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:34:17Z","timestamp":1703878457000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Metrics and Red Teaming in Cyber Resilience and Effectiveness: A Systematic Literature Review"],"prefix":"10.1109","author":[{"given":"Semi","family":"Yulianto","sequence":"first","affiliation":[{"name":"Binus Graduate Program, Doctor of Computer Science, Bina Nusantara University,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Benfano","family":"Soewito","sequence":"additional","affiliation":[{"name":"Binus Graduate Program. Master of Computer Science Bina Nusantara University,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Ford Lumban","family":"Gaol","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,Doctor of Computer Science,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Aditiya","family":"Kurniawan","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,Doctor of Computer Science,Computer Science Department,Jakarta,Indonesia,11480"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-151-4-200908180-00135"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01671-z"},{"issue":"1","key":"ref3","first-page":"81","article-title":"Blue Teams Hone Their Skills in IBMs Cyber Range","volume-title":"IEEE Security & Privacy","volume":"15","author":"Chari","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/16258312.2022.2101898"},{"issue":"9","key":"ref5","first-page":"169","article-title":"Analysis of automated adversary emulation techniques","volume":"49","author":"Applebaum","year":"2017","journal-title":"Simulation Series"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991111"},{"issue":"3","key":"ref7","first-page":"6329","article-title":"A novel stochastic model for cybersecurity metric inspired by markov chain model and attack graphs","volume":"9","author":"Aissa","year":"2020","journal-title":"International Journal of Scientific and Technology research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MLSD55143.2022.9934157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s22062126"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208266"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104260"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3272629"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/18335330.2023.2209849"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823717"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823701"},{"journal-title":"Syngress","article-title":"Automated security analysis of android and iOS applications with mobile security framework","year":"2015","author":"Henry","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/10468781221135199"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170785"},{"key":"ref20","first-page":"37","article-title":"Crossed swords: A cyber red team oriented technical exercise","volume-title":"European Conference on Information Warfare and Security, ECCWS, 2019","author":"Blumbergs","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5220\/0007310300880099"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03375-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2017.740"},{"issue":"3","key":"ref24","first-page":"295","article-title":"Reality monitoring of terrorist plots: Applying entropic analysis to assess terrorist intentionality","volume":"27","author":"Dagnall","year":"2019","journal-title":"Psychology, Crime and Law"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91875-4_2"},{"issue":"3\u20134","key":"ref27","first-page":"189","article-title":"Beyond penetration testing: Adversarial attack modeling","volume":"23","author":"Davies","year":"2014","journal-title":"Information Security Journal"},{"key":"ref28","first-page":"25","article-title":"In search of darkness: 21st century red teaming","author":"Davies","year":"2014","journal-title":"Cyber Defense Review"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00047"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.011301733"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.021921653"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1162\/pres_a_00363"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19961-5_16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0040"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14488\/BJOPM.1535.2023"},{"key":"ref36","first-page":"59","article-title":"Security as code and deployment pipeline integration for DevOps teams","volume":"10337 LNCS","author":"Dahri","year":"2017","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110759"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/app12188983"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0962-9_10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/SC-07-2013-0011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.17586\/2226-1494-2023-23-3-538-546"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzz062"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC55209.2022.9851735"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060733"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1177\/1541931218621056"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00652-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00734-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2018.8473542"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3298824"},{"key":"ref50","first-page":"83","article-title":"A Comparative Study of Commonly Used Trust Metrics for Mobile Ad Hoc Networks","volume-title":"Proceedings - 2017 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017","author":"Wang","year":"2017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1177\/1541931214581048"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08281-3_5"},{"issue":"55","key":"ref53","first-page":"99","article-title":"The epistemic value of partisanship","volume":"19","author":"Cerovac","year":"2019","journal-title":"Croatian Journal of Philosophy"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/EDM52169.2021.9507632"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00187"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3546096.3546115"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3277666"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/iot2040038"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SMART55829.2022.10046954"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030723"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/9781119552482.ch12"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103382"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12385-7_60"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.4271\/2021-01-0138"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.4271\/2021-01-0138"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2014.993471"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2018.8352396"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom55334.2022.00034"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746215"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-015-0261-7"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.18260\/3-2-370-31523","article-title":"Automatic collection of scoring metrics in competitive cybersecurity lab environments","volume-title":"Proceeding of the 2019 Conference for Industry and Education Collaboration (CIEC)","author":"Hempenius","year":"2019"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT57182.2022.9994184"},{"key":"ref74","first-page":"1","article-title":"The industrial internet of things security challenge","volume":"103","author":"Dardani","year":"2017","journal-title":"Computers in Industry"},{"article-title":"Insider attack metrics for cybersecurity: investigating various research options","volume-title":"IISE Annual Conference and Expo","year":"2019","author":"Goethals","key":"ref75"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/en15238778"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00469-y"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2017.7994949"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590786"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_8"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00040"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100387"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85529-1_25"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.30"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.06.228"}],"event":{"name":"2023 29th International Conference on Telecommunications (ICT)","start":{"date-parts":[[2023,11,8]]},"location":"Toba, Indonesia","end":{"date-parts":[[2023,11,9]]}},"container-title":["2023 29th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10374015\/10374030\/10374053.pdf?arnumber=10374053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T02:40:10Z","timestamp":1730947210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10374053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/ict60153.2023.10374053","relation":{},"subject":[],"published":{"date-parts":[[2023,11,8]]}}}