{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T02:00:00Z","timestamp":1720490400300},"reference-count":82,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1016\/j.cose.2014.04.009","type":"journal-article","created":{"date-parts":[[2014,5,9]],"date-time":"2014-05-09T15:09:14Z","timestamp":1399648154000},"page":"1-16","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":60,"special_numbering":"C","title":["Taxonomy of intrusion risk assessment and response system"],"prefix":"10.1016","volume":"45","author":[{"given":"Alireza","family":"Shameli-Sendi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Cheriet","sequence":"additional","affiliation":[]},{"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib1","first-page":"60","article-title":"Network intrusion detection based on rough set and k-nearest neighbour","volume":"2","author":"Adetunmbi","year":"2008","journal-title":"Int J Comput ICT Res"},{"key":"10.1016\/j.cose.2014.04.009_bib3","series-title":"Proceedings of 9th ACM Conference on Computer and Communications Security (ACM-CCS 2002)","first-page":"217","article-title":"Scalable, graph-based network vulnerability analysis","author":"Ammann","year":"2002"},{"key":"10.1016\/j.cose.2014.04.009_bib4","first-page":"110","article-title":"Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree","author":"Anuar","year":"2008","journal-title":"Malays J Comput Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0127-9084","issn-type":"print"},{"key":"10.1016\/j.cose.2014.04.009_bib5","series-title":"Information Security for South Africa","first-page":"1","article-title":"An investigation and survey of response options for intrusion response systems","author":"Anuar","year":"2010"},{"key":"10.1016\/j.cose.2014.04.009_bib6","series-title":"Computational Intelligence and Security, vol. 3802 of Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/586110.586140","article-title":"Real-time risk assessment with network sensors and intrusion detection systems","author":"Arnes","year":"2005"},{"key":"10.1016\/j.cose.2014.04.009_bib8","series-title":"Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection","first-page":"136","article-title":"Using specification-based intrusion detection for automated response","author":"Balepin","year":"2003"},{"key":"10.1016\/j.cose.2014.04.009_bib9","series-title":"Survey of clustering data mining techniques","author":"Berkhin","year":"2001"},{"key":"10.1016\/j.cose.2014.04.009_bib10","series-title":"DARPA Information Survivability Conference and Exposition","first-page":"84","article-title":"Building survivable systems: an integrated approach based on intrusion detection and damage containment","author":"Bowen","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib11","series-title":"IEEE Workshop on Information Assurance and Security","article-title":"An intrusion response taxonomy and its role in automatic intrusion response","author":"Carver","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib12","series-title":"IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop","first-page":"110","article-title":"A methodology for using intelligent agents to provide automated intrusion response","author":"Carver","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib13","series-title":"IEEE Network Operations and Management Symposium","article-title":"Policy management for network-based intrusion detection and prevention","author":"Chen","year":"2004"},{"key":"10.1016\/j.cose.2014.04.009_bib14","series-title":"40th Hawaii International Conference on System Sciences, Big Island, Hawaii","article-title":"Value driven security threat modeling based on attack path analysis","author":"Chen","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib15","series-title":"Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection (RAID2000)","first-page":"197","article-title":"Lambda: a language to model a database for detection of attacks","author":"Cuppens","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib16","series-title":"Adaptive agent-based intrusion response","author":"Curtis","year":"2001"},{"key":"10.1016\/j.cose.2014.04.009_bib17","series-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)","first-page":"445","article-title":"Risk management using behavior based attack graphs","author":"Dantu","year":"2004"},{"issue":"6","key":"10.1016\/j.cose.2014.04.009_bib18","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.cose.2011.05.008","article-title":"Data preprocessing for anomaly based network intrusion detection: a review","volume":"30","author":"Davis","year":"2011","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib20","unstructured":"Difference between Signature Based and Anomaly Based Detection in IDS, URL http:\/\/www.secguru.com\/forum\/difference between signature based and anomaly based detection in ids."},{"key":"10.1016\/j.cose.2014.04.009_bib21","series-title":"The 40th Hawaii International Conference on System Sciences, Hawaii","article-title":"Security ontologies: improving quantitative risk analysis","author":"Ekelhart","year":"2007"},{"issue":"3","key":"10.1016\/j.cose.2014.04.009_bib22","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1137\/1.9781611972733.3","article-title":"Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation","volume":"32","author":"Feng","year":"2009","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.cose.2014.04.009_bib23","series-title":"A taxonomy and implementation of automated responses to intrusive behavior","author":"Fisch","year":"1996"},{"key":"10.1016\/j.cose.2014.04.009_bib24","series-title":"International Conference on Dependable Systems and Networks","first-page":"508","article-title":"ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment","author":"Foo","year":"2005"},{"key":"10.1016\/j.cose.2014.04.009_bib26","series-title":"Recent Advances in Intrusion Detection: 7th International Symposium, (RAID 2004)","first-page":"296","article-title":"Rheostat: real-time risk management","author":"Gehani","year":"2004"},{"key":"10.1016\/j.cose.2014.04.009_bib27","series-title":"An introduction to logweaver","author":"Goubault-Larrec","year":"2001"},{"key":"10.1016\/j.cose.2014.04.009_bib28","series-title":"Data mining: concepts and techniques","author":"Han","year":"2006"},{"key":"10.1016\/j.cose.2014.04.009_bib29","series-title":"Proceedings of the 3rd International Symposium on Information Assurance and Security","first-page":"183","article-title":"DIPS: a framework for distributed intrusion prediction and prevention using Hidden Markov Models and online fuzzy risk assessment","author":"Haslum","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib30","series-title":"33rd IEEE Conference on Local Computer Networks","first-page":"927","article-title":"Real-time intrusion prevention and security analysis of networks using HMMs","author":"Haslum","year":"2008"},{"key":"10.1016\/j.cose.2014.04.009_bib31","series-title":"Tenth International Conference on Computer Modeling and Simulation","first-page":"216","article-title":"Fuzzy online risk assessment for distributed intrusion prediction and prevention systems","author":"Haslum","year":"2008"},{"issue":"2\u20133","key":"10.1016\/j.cose.2014.04.009_bib32","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s11235-009-9248-8","article-title":"Information system security compliance to FISMA standard: a quantitative measure","volume":"45","author":"Hulitt","year":"2010","journal-title":"Telecommun Syst"},{"key":"10.1016\/j.cose.2014.04.009_bib33","series-title":"Proceedings of the 3rd LCN Workshop on Network Security. Held in conjunction with the 32nd IEEE Conference on Local Computer Networks (LCN)","first-page":"1035","article-title":"Graph-based metrics for intrusion response measures in computer networks","author":"Jahnke","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib34","series-title":"Proceedings of the 15th Computer Security Foundation Workshop","article-title":"Two formal analyses of attack graphs","author":"Jha","year":"2002"},{"key":"10.1016\/j.cose.2014.04.009_bib35","series-title":"Proceedings of the Second international conference on Critical Information Infrastructures Security","first-page":"58","article-title":"Advanced reaction using risk assessment in intrusion detection systems","author":"Kanoun","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib36","series-title":"Third International Conference on Risks and Security of Internet and Systems","first-page":"117","article-title":"Automated reaction based on risk analysis and attackers skills in intrusion detection systems","author":"Kanoun","year":"2008"},{"key":"10.1016\/j.cose.2014.04.009_bib37","series-title":"Proceedings of the Fourth International Conference on Network and System Security","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/CSAC.2002.1176302","article-title":"Risk-aware framework for activating and deactivating policy-based response","author":"Kanoun","year":"2010"},{"issue":"2","key":"10.1016\/j.cose.2014.04.009_bib38","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.cose.2004.07.004","article-title":"ISRAM: information security risk analysis method","volume":"24","author":"Karabacak","year":"2005","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib39","series-title":"Response policies and counter-measures: Management of service dependencies and intrusion and reaction impacts","author":"Kheir","year":"2010"},{"key":"10.1016\/j.cose.2014.04.009_bib40","series-title":"IFIP International Conference on Network and Service Security","article-title":"Cost evaluation for intrusion response using dependency graphs","author":"Kheir","year":"2009"},{"key":"10.1016\/j.cose.2014.04.009_bib41","series-title":"Proceedings of the 15th European Conference on Research in Computer Security","first-page":"626","article-title":"A service dependency model for cost sensitive intrusion response","author":"Kheir","year":"2010"},{"key":"10.1016\/j.cose.2014.04.009_bib42","series-title":"Proceedings of the Third SIAM International Conference on Data Mining","article-title":"A comparative study of anomaly detection schemes in network intrusion detection","author":"Lazarevic","year":"2003"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib43","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-2002-101-202","article-title":"Toward cost-sensitive modeling for intrusion detection and response","volume":"10","author":"Lee","year":"2002","journal-title":"J Comput Secur"},{"issue":"3","key":"10.1016\/j.cose.2014.04.009_bib44","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.cose.2005.09.004","article-title":"Real-time analysis of intrusion detection alerts via correlation","volume":"25","author":"Lee","year":"2006","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib45","series-title":"DARPA Information Survivability Conference and Exposition","first-page":"77","article-title":"SARA: survivable autonomic response architecture","author":"Lewandowski","year":"2001"},{"key":"10.1016\/j.cose.2014.04.009_bib47","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.cose.2013.09.010","article-title":"Creditability-based weighted voting for reducing false positives and negatives in intrusion detection","volume":"39","author":"Lin","year":"2013","journal-title":"Comput Secur"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib48","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.eswa.2011.07.015","article-title":"A hybrid information security risk assessment procedure considering interdependences between controls","volume":"39","author":"Lo","year":"2012","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.cose.2014.04.009_bib50","series-title":"2000 DARPA intrusion detection scenario specific data sets","author":"MIT Lincoln Laboratory","year":"2000"},{"issue":"3","key":"10.1016\/j.cose.2014.04.009_bib51","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1016\/j.eswa.2009.07.079","article-title":"An intrusion response decision-making model based on hierarchical task network planning","volume":"37","author":"Mu","year":"2010","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.cose.2014.04.009_bib52","series-title":"Proceedings of the 13th European Symposium on Research in Computer Security","first-page":"35","article-title":"Online risk assessment of intrusion scenarios using D\u2013S evidence theory","author":"Mu","year":"2008"},{"key":"10.1016\/j.cose.2014.04.009_bib53","series-title":"DARPA Information Survivability Conference and Exposition","first-page":"56","article-title":"System or security managers adaptive response tool","author":"Musman","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib54","series-title":"Proceedings of the 21st Annual Computer Security Conference (ACSAC)","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/HICSS.2007.601","article-title":"Understanding complex network attack graphs through clustered adjacency matrices","author":"Noel","year":"2005"},{"issue":"3","key":"10.1016\/j.cose.2014.04.009_bib55","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1108\/09685220610670396","article-title":"Achieving automated intrusion response: a prototype implementation","volume":"14","author":"Papadaki","year":"2006","journal-title":"Inf Manag Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib56","first-page":"353","article-title":"EMERALD: event monitoring enabling responses to anomalous live disturbances","author":"Porras","year":"1997","journal-title":"Natl Inf Syst Secur Conf"},{"key":"10.1016\/j.cose.2014.04.009_bib57","series-title":"IEEE International Conference on Systems, Man, and Cybernetics","first-page":"2344","article-title":"Adaptation techniques for intrusion detection and intrusion response system","author":"Ragsdale","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib58","series-title":"Security and Management","first-page":"390","article-title":"Formulation of a heuristic rule for misuse and anomaly detection for U2R attacks in Solaris operating system environment","author":"Sabhnani","year":"2003"},{"key":"10.1016\/j.cose.2014.04.009_bib59","series-title":"ACM SIGCOMM","first-page":"295","article-title":"Practical network support for IP traceback","author":"Savage","year":"2000"},{"key":"10.1016\/j.cose.2014.04.009_bib60","series-title":"Guide to intrusion detection and prevention systems","author":"Scarfone","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib61","series-title":"IEEE DARPA Information Survivability Conference and Exposition","first-page":"56","article-title":"Cooperative intrusion traceback and response architecture (CITRA)","author":"Schnackenberg","year":"2001"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib62","first-page":"1","article-title":"Intrusion response systems: survey and taxonomy","volume":"12","author":"Shameli-Sendi","year":"2012","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"3","key":"10.1016\/j.cose.2014.04.009_bib64","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","article-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection","volume":"31","author":"Shiravi","year":"2012","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib65","series-title":"Proceedings of the 9th USENIX Security Symposium","first-page":"185","article-title":"Automated response using system-call delay","author":"Somayaji","year":"2000"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib66","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2009.07.008","article-title":"Reducing false positives in intrusion detection systems","volume":"29","author":"Spathoulas","year":"2010","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib67","series-title":"A framework for adaptive, cost-sensitive intrusion detection and response system","author":"Stakhanova","year":"2007"},{"key":"10.1016\/j.cose.2014.04.009_bib68","series-title":"Proceedings of the 21st International Conference on Advanced Networking and Applications","first-page":"428","article-title":"A cost-sensitive model for preemptive intrusion response systems","author":"Stakhanova","year":"2007"},{"issue":"2","key":"10.1016\/j.cose.2014.04.009_bib69","first-page":"169","article-title":"Taxonomy of intrusion response systems","volume":"1","author":"Stakhanova","year":"2007","journal-title":"J Inf Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib70","series-title":"Proceedings of the 43rd annual Southeast regional conference, Georgia","isbn-type":"print","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/1167253.1167288","article-title":"Decision tree classifier for network intrusion detection with GA-based feature selection","author":"Stein","year":"2005","ISBN":"http:\/\/id.crossref.org\/isbn\/1595930590"},{"key":"10.1016\/j.cose.2014.04.009_bib71","series-title":"Proceedings of IEEE Computer Software and Applications Conference","first-page":"355","article-title":"A framework for cost sensitive assessment of intrusion response selection","author":"Strasburg","year":"2009"},{"key":"10.1016\/j.cose.2014.04.009_bib72","series-title":"The methodology for evaluating response cost for intrusion response systems","author":"Strasburg","year":"2008"},{"key":"10.1016\/j.cose.2014.04.009_bib73","first-page":"1","article-title":"Adaptive intrusion response to minimize risk over multiple network attacks","author":"Tanachaiwiwat","year":"2002","journal-title":"ACM Trans Inf Syst Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib74","series-title":"Snort users manual 2.8.5","author":"The Snort Project","year":"2009"},{"key":"10.1016\/j.cose.2014.04.009_bib75","series-title":"Proceedings at the 19th IFIP International Information Security Conference, Kluwer Academic, Toulouse","first-page":"209","article-title":"A language driven intrusion detection system for event and alert correlation","author":"Totel","year":"2004"},{"key":"10.1016\/j.cose.2014.04.009_bib76","series-title":"Proceedings of the 18th Annual Computer Security Applications Conference, Los Alamitos, USA","article-title":"Evaluating the impact of automated intrusion response mechanisms","author":"Toth","year":"2002"},{"key":"10.1016\/j.cose.2014.04.009_bib77","unstructured":"University of California. KDD Cup 1999 data, http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"10.1016\/j.cose.2014.04.009_bib78","first-page":"50","article-title":"Tracing based active intrusion response","volume":"1","author":"Wang","year":"2001","journal-title":"J Inf Warefare"},{"issue":"15","key":"10.1016\/j.cose.2014.04.009_bib79","doi-asserted-by":"crossref","first-page":"2917","DOI":"10.1016\/j.comcom.2006.04.001","article-title":"Using attack graph for correlating, hypothesizing, and predicting intrusion alerts","volume":"29","author":"Wang","year":"2006","journal-title":"Comput Commun"},{"key":"10.1016\/j.cose.2014.04.009_bib80","series-title":"Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC08)","article-title":"An attack graph-based probabilistic security metric","author":"Wang","year":"2008"},{"key":"10.1016\/j.cose.2014.04.009_bib81","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.cose.2012.09.013","article-title":"Exploring attack graph for cost-benefit security hardening: a probabilistic approach","volume":"32","author":"Wang","year":"2013","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2014.04.009_bib82","series-title":"CSI 28th Annual Computer Security Conference, Washington, DC","article-title":"Cost-benet analysis for network intrusion detection systems","author":"Wei","year":"2001"},{"key":"10.1016\/j.cose.2014.04.009_bib83","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.484228","article-title":"Cooperating security managers: a peer-based intrusion detection system","volume":"10","author":"White","year":"1996","journal-title":"IEEE Netw"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib84","first-page":"88","article-title":"A novel data mining-based method for alert reduction and analysis","volume":"5","author":"Xiao","year":"2010","journal-title":"J Netw"},{"key":"10.1016\/j.cose.2014.04.009_bib86","series-title":"Automated signature generation of network attacks","author":"Yusof","year":"2009"},{"key":"10.1016\/j.cose.2014.04.009_bib87","series-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC 2008)","first-page":"215","article-title":"Attack grammar: a new approach to modeling and analyzing network attack sequences","author":"Zhang","year":"2008"},{"issue":"7","key":"10.1016\/j.cose.2014.04.009_bib88","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1016\/j.cose.2009.03.005","article-title":"Measuring IDS-estimated attack impacts for rational incident response: a decision theoretic approach","volume":"28","author":"Zhang","year":"2009","journal-title":"Comput Secur"},{"issue":"6","key":"10.1016\/j.cose.2014.04.009_bib89","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/j.cose.2011.06.002","article-title":"Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks","volume":"30","author":"Zhang","year":"2011","journal-title":"Comput Secur"},{"issue":"1","key":"10.1016\/j.cose.2014.04.009_bib90","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","article-title":"A survey of coordinated attacks and collaborative intrusion detection","volume":"29","author":"Zhou","year":"2010","journal-title":"Comput Secur"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404814000613?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404814000613?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T08:22:08Z","timestamp":1538641328000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404814000613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":82,"alternative-id":["S0167404814000613"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2014.04.009","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2014,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Taxonomy of intrusion risk assessment and response system","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2014.04.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}