{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:17:33Z","timestamp":1729649853589,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/edocw.2015.33","type":"proceedings-article","created":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T22:20:25Z","timestamp":1446157225000},"page":"79-87","source":"Crossref","is-referenced-by-count":14,"title":["A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources"],"prefix":"10.1109","author":[{"given":"Margus","family":"Valja","sequence":"first","affiliation":[]},{"given":"Robert","family":"Lagerstrom","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[]},{"given":"Matus","family":"Korman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31","article-title":"XSL Transformations (XSLT) Version 2.0"},{"year":"0","key":"ref30","article-title":"PostgreSQL"},{"key":"ref10","first-page":"8","article-title":"A Tool for Automatic Enterprise Architecture Modeling","author":"buschle","year":"2011","journal-title":"CAISE11 Forum"},{"key":"ref11","first-page":"825","article-title":"Automatic data collection for enterprise architecture models","author":"holm","year":"2012","journal-title":"Softw Syst Model"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/3468.844354"},{"key":"ref13","first-page":"19","article-title":"Some Process Patterns for Enterprise Architecture Management","author":"moser","year":"2009","journal-title":"Softw Eng 2009 – Work"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2011.19"},{"key":"ref15","first-page":"3","article-title":"Data cleaning: Problems and current approaches","volume":"23","author":"rahm","year":"2000","journal-title":"IEEE Data Eng Bull"},{"year":"0","key":"ref16","article-title":"UML Resource Page"},{"year":"2012","key":"ref17","article-title":"OCL"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/978-3-642-36796-0_10","article-title":"P2AMF: Predictive, probabilistic architecture modeling framework","author":"johnson","year":"2013","journal-title":"Lecture Notes in Business Information Processing"},{"key":"ref19","first-page":"89","article-title":"A method for creating enterprise architecture metamodels—applied to systems modifiability analysis","volume":"6","author":"lagerstr\u00f6m","year":"2009","journal-title":"Int J Comput Sci Appl"},{"year":"0","key":"ref28","article-title":"Extensible Markup Language"},{"key":"ref4","first-page":"325","article-title":"REQUIREMENTS FOR AUTOMATED ENTERPRISE ARCHITECTURE MODEL MAINTENANCE A Requirements Analysis based on a Literature Review and an Exploratory Survey","author":"farwick","year":"2011","journal-title":"13th Int Conf Enterp Inf Syst (ICEIS)"},{"article-title":"About Wireshark","year":"0","author":"combs","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.02.019"},{"year":"0","key":"ref29","article-title":"Talend Open Studio"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2008.20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2010.17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2554646"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.187"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1409540.1409542"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-007-9030-y"},{"key":"ref20","first-page":"1","article-title":"P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language","volume":"pp","author":"holm","year":"2014","journal-title":"Dependable Secur Comput IEEE Trans"},{"key":"ref22","article-title":"Assessment of enterprise information security-estimating the credibility of the results","author":"johansson","year":"2005","journal-title":"Proceeding Symp Requir Eng Inf Secur 13th Int IEEE Requir Eng Con!"},{"year":"2014","key":"ref21","article-title":"The Multi-Attribute Prediction (MAP) class diagram"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34163-2_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.200"},{"key":"ref26","first-page":"1","article-title":"Empirical analysis of system-level vulnerability metrics through actual attacks","author":"holm","year":"2011","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref25","article-title":"Automating Enterprise Architecture Documentation using an Enterprise Service Bus","author":"buschle","year":"2012","journal-title":"Amer Conf Inform Syst"}],"event":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW)","start":{"date-parts":[[2015,9,21]]},"location":"Adelaide, Australia","end":{"date-parts":[[2015,9,25]]}},"container-title":["2015 IEEE 19th International Enterprise Distributed Object Computing Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7306580\/7310651\/07310674.pdf?arnumber=7310674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:31:40Z","timestamp":1498257100000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7310674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/edocw.2015.33","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}