{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T07:44:31Z","timestamp":1724571871531},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T00:00:00Z","timestamp":1440115200000},"content-version":"vor","delay-in-days":232,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/j.procs.2015.08.625","type":"journal-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T00:28:23Z","timestamp":1442276903000},"page":"1035-1042","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["Selecting Optimal Subset of Security Controls"],"prefix":"10.1016","volume":"64","author":[{"given":"Iryna","family":"Yevseyeva","sequence":"first","affiliation":[]},{"given":"Vitor","family":"Basto-Fernandes","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Emmerich","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2015.08.625_bib0005","unstructured":"10 Steps to cyber security: executive companion. BIS\/12\/1120. Published on 5 September 2012. https:\/\/www.gov.uk\/government\/publications\/cyber-risk-management-a-board-level-responsibility."},{"key":"10.1016\/j.procs.2015.08.625_bib0010","unstructured":"Mobile Devices. Guide for Implementers. Published in February 2013. MWR InfoSecurity. https:\/\/www.cpni.gov.uk\/Documents\/Publications\/Non-CPNI_pubs\/2013-02-22-mobile_devices_guide_for_implementers.pdf."},{"key":"10.1016\/j.procs.2015.08.625_bib0015","unstructured":"Consumerization of IT: Risk Mitigation Strategies. Responding to the Emerging Threat Environment. ENISA Deliverable. Published on 19 December 2012. http:\/\/www.enisa.europa.eu\/activities\/risk-management\/evolving-threat-environment\/COIT_Mitigation_Strategies_Final_Report."},{"key":"10.1016\/j.procs.2015.08.625_bib0020","unstructured":"ISO\/IEC 27002, Information Technology \u2013 Security Techniques \u2013 Code of practice for information security management, 2005. http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=50297."},{"key":"10.1016\/j.procs.2015.08.625_bib0025","article-title":"Nonlinear Multiobjective Optimization","author":"Miettinen","year":"1999","journal-title":"Kluwer"},{"key":"10.1016\/j.procs.2015.08.625_bib0030","doi-asserted-by":"crossref","unstructured":"B\u00e4ck Th., Fogel D.B. and Michalewicz Z.(Editors): Handbook of Evolutionary Computation, Taylor and Francis, 1997.","DOI":"10.1887\/0750308958"},{"key":"10.1016\/j.procs.2015.08.625_bib0035","article-title":"Multi-Objective Optimization Using Evolutionary Algorithms","author":"Deb","year":"2001","journal-title":"Wiley, Chichester, UK"},{"key":"10.1016\/j.procs.2015.08.625_bib0040","article-title":"Introduction to Evolutionary Computing, Springer, Natural Computing Series","author":"Eiben","year":"2007","journal-title":"Corr. 2nd printing"},{"key":"10.1016\/j.procs.2015.08.625_bib0045","article-title":"Managing Cybersecurity Resources: A cost-benefit analysis","author":"Gordon","year":"2006","journal-title":"McGraw-Hill Inc."},{"issue":"1","key":"10.1016\/j.procs.2015.08.625_bib0050","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.omega.2011.03.008","article-title":"IT security planning under uncertainty for high-impact events","volume":"40","author":"Rakes","year":"2012","journal-title":"Omega: International Journal of Management Science"},{"key":"10.1016\/j.procs.2015.08.625_bib0055","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.dss.2013.01.001","article-title":"Selection of optimal countermeasure portfolio in IT security planning","volume":"55","author":"Sawik","year":"2013","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.procs.2015.08.625_bib0060","unstructured":"Dodgson J.S., Spackman M., Pearman A. and Phillips L.D. Multi-criteria analysis: A manual. Department for Communities and Local Government: London. 2009. ISBN 9781409810230, http:\/\/eprints.lse.ac.uk\/12761\/."},{"key":"10.1016\/j.procs.2015.08.625_bib0065","article-title":"Improving Security Technology Selections with Decision Theory","author":"Butler","year":"2001","journal-title":"Third Workshop on Economics - Driven Software Engineering Research"},{"key":"10.1016\/j.procs.2015.08.625_bib0070","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.dss.2012.04.001","article-title":"A novel risk assessment and optimization model for a multi-objective network security countermeasure selection problem","volume":"53","author":"Viduto","year":"2012","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.procs.2015.08.625_bib0075","unstructured":"True North Consulting LLC website: http:\/\/www.tru-nor.com\/network-monitoring--analysis.html."},{"key":"10.1016\/j.procs.2015.08.625_bib0080","unstructured":"MSB Cybersecurity website: http:\/\/www.msbai.com\/security-insight-overview.php."},{"key":"10.1016\/j.procs.2015.08.625_bib0085","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1016\/j.envint.2006.06.013","article-title":"From comparative risk assessment to multi-criteria decision analysis and adaptive management: Recent developments and applications","volume":"32","author":"Linkov","year":"2006","journal-title":"Environment International"},{"key":"10.1016\/j.procs.2015.08.625_bib0090","doi-asserted-by":"crossref","DOI":"10.1007\/s10669-013-9465-2","article-title":"Multiscale approach to the security of hardware supply chains for energy systems","author":"Lambert","year":"2013","journal-title":"Environ Syst Decis, Springer"},{"key":"10.1016\/j.procs.2015.08.625_bib0095","article-title":"Managing a portfolio of risks","author":"Keisler","year":"2011","journal-title":"University of Massachusetts Boston, US, January"},{"key":"10.1016\/j.procs.2015.08.625_bib0100","first-page":"77","article-title":"Portfolio Selection","volume":"7","author":"Markowitz","year":"1952","journal-title":"The Journal of Finance"},{"key":"10.1016\/j.procs.2015.08.625_bib0105","article-title":"Strategic Decision Making: Multiobjective Decision Analysis with Spreadsheets. Belmont, California","author":"Kirkwood","year":"1997","journal-title":"USA: Wadsworth Publishing Company"},{"key":"10.1016\/j.procs.2015.08.625_bib0110","article-title":"Optimization Methods in Finance","author":"Cornuejols","year":"2007","journal-title":"Cambridge University Press"},{"key":"10.1016\/j.procs.2015.08.625_bib0115","article-title":"IT Project Portfolio Management","author":"Bonham","year":"2004","journal-title":"Norwood, Artech House, Incorporated"},{"key":"10.1016\/j.procs.2015.08.625_bib0120","doi-asserted-by":"crossref","unstructured":"Yevseyeva I, Guerreiro A.P., Emmerich M.T.M., Fonseca C.M.: A portfolio optimization Approach to Selection in Multiobjective Evolutionary Algorithms, In T. Bartz-Beielstein, J. Branke, B. Filipi\u010d, J. Smith (Editors) \u201cParallel Problem Solving from Nature \u2013 PPSN XIII\u201d, Ser. LNCS (vol. 8672), Springer, (2014) 672-351.","DOI":"10.1007\/978-3-319-10762-2_66"},{"key":"10.1016\/j.procs.2015.08.625_bib0125","unstructured":"Gurobi Optimizer 6.0. Gurobi Optimization 2015. http:\/\/www.gurobi.com\/."},{"key":"10.1016\/j.procs.2015.08.625_bib0130","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.advengsoft.2011.05.014","article-title":"jMetal: a Java Framework for Multi-Objective Optimization","volume":"42","author":"Durillo","year":"2011","journal-title":"Advances in Engineering Software"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705091502760X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705091502760X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T07:27:18Z","timestamp":1537342038000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705091502760X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":26,"alternative-id":["S187705091502760X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2015.08.625","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Selecting Optimal Subset of Security Controls","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2015.08.625","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}