{"id":"https://openalex.org/W4384834770","doi":"https://doi.org/10.23919/cycon58705.2023.10181814","title":"Zero-Day Operational Cyber Readiness","display_name":"Zero-Day Operational Cyber Readiness","publication_year":2023,"publication_date":"2023-05-29","ids":{"openalex":"https://openalex.org/W4384834770","doi":"https://doi.org/10.23919/cycon58705.2023.10181814"},"language":"en","primary_location":{"id":"doi:10.23919/cycon58705.2023.10181814","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/cycon58705.2023.10181814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025673405","display_name":"Bar\u0131\u015f Egemen \u00d6zkan","orcid":"https://orcid.org/0000-0002-6675-9090"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bar\u0131\u015f Egemen \u00d6zkan","raw_affiliation_strings":["&#x0130;stanbul,T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"&#x0130;stanbul,T&#x00FC;rkiye","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092503452","display_name":"\u0130hsan B. Tolga","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"\u0130hsan B. Tolga","raw_affiliation_strings":["Binalyze,Tallinn,Estonia","Binalyze, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Binalyze,Tallinn,Estonia","institution_ids":[]},{"raw_affiliation_string":"Binalyze, Tallinn, Estonia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025673405"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66857197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"199","last_page":"215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9058316946029663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6290320754051208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5034095644950867},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.48386943340301514},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.42497891187667847},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.34897810220718384},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24853560328483582},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08981436491012573}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9058316946029663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6290320754051208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5034095644950867},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.48386943340301514},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.42497891187667847},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.34897810220718384},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24853560328483582},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08981436491012573},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon58705.2023.10181814","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/cycon58705.2023.10181814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1510448193","https://openalex.org/W2290760316","https://openalex.org/W2470191158","https://openalex.org/W2907374258","https://openalex.org/W3039806947","https://openalex.org/W3040069344","https://openalex.org/W3182104486"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2131575257","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2377660959","https://openalex.org/W2810589793","https://openalex.org/W4251169878","https://openalex.org/W2527886746"],"abstract_inverted_index":{"As":[0],"we":[1,148,164],"move":[2],"all":[3],"our":[4],"business":[5],"practices":[6],"into":[7],"cyber":[8,62,71,101,127,132,138,159,243],"terrain,":[9],"the":[10,26,97,121,150,186,192,197,209,233],"unique":[11,98],"characteristics":[12],"of":[13,28,36,100,201,211,217],"cyberspace":[14,29,44,168,229],"assets":[15],"and":[16,24,33,38,42,54,60,69,157,177,184,199,241],"threats":[17],"require":[18],"a":[19,47,77,83,126,166,223],"different":[20],"perspective":[21,227],"to":[22,110,115,118,124,154,181,194],"define":[23],"implement":[25],"concept":[27],"readiness.":[30,103,160],"The":[31,214],"connected":[32],"dependent":[34],"nature":[35],"functional":[37],"core":[39],"services":[40,93],"in":[41,82,221],"through":[43],"has":[45,112,191],"created":[46],"nondeterministic":[48],"security":[49],"environment":[50],"with":[51,73],"unpredictable,":[52],"ubiquitous":[53],"ambiguous":[55],"threat":[56,80],"perceptions.":[57],"Building,":[58],"increasing":[59],"sustaining":[61,70],"readiness":[63,88,169,226,231],"requires":[64],"producing,":[65],"training,":[66],"equipping,":[67],"deploying":[68],"warriors":[72],"competent":[74],"capabilities":[75,176],"against":[76],"continuously":[78],"mutating":[79],"landscape":[81],"timely":[84],"manner.":[85],"Traditional":[86],"military":[87,242],"approaches":[89],"geared":[90],"for":[91,137,228,239],"kinetic":[92,235],"do":[94],"not":[95],"suit":[96],"requirements":[99],"warfare":[102],"A":[104],"unit":[105],"at":[106],"\u201c60":[107],"days":[108,114,143],"notice":[109],"move\u201d":[111],"60":[113],"get":[116],"ready":[117,136],"act.":[119],"If":[120],"average":[122,141],"time":[123],"detect":[125],"attack":[128],"is":[129,220],"200":[130,142],"days,":[131],"defenders":[133],"must":[134],"be":[135],"attacks":[139],"on":[140,172,208],"before":[144],"they":[145],"start.":[146],"Hence,":[147],"propose":[149],"term":[151],"\u201czero-day":[152],"readiness\u201d":[153],"describe":[155],"agile":[156],"vigilant":[158],"In":[161],"this":[162,218],"paper,":[163],"offer":[165],"novel":[167],"model":[170,190],"based":[171],"principles,":[173],"resources,":[174],"activities,":[175],"benefits.":[178],"While":[179],"resource-demanding":[180],"build,":[182],"improve":[183],"sustain,":[185],"proposed":[187],"Zero-Day":[188],"Readiness":[189],"potential":[193],"significantly":[195],"increase":[196],"assessment":[198],"visibility":[200],"gaps":[202],"as":[203,205],"well":[204],"support":[206],"judgment":[207],"allocation":[210],"limited":[212],"resources.":[213],"added":[215],"value":[216],"research":[219],"developing":[222],"more":[224],"revisionist":[225],"operational":[230,236],"than":[232],"traditional":[234],"domains,":[237],"particularly":[238],"organizational":[240],"defense":[244],"perspectives.":[245]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
