{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:11:27Z","timestamp":1729653087723,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/issrew.2014.53","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:55:42Z","timestamp":1419983742000},"page":"33-36","source":"Crossref","is-referenced-by-count":0,"title":["NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks"],"prefix":"10.1109","author":[{"given":"Stefano","family":"Avallone","sequence":"first","affiliation":[]},{"given":"Gabriella","family":"Carrozza","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Cinque","sequence":"additional","affiliation":[]},{"given":"Raffaele Della","family":"Corte","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Marotta","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pecchia","sequence":"additional","affiliation":[]},{"given":"Agostino","family":"Savignano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494622"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544279"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/EDCC.2014.18","article-title":"Mining invariants from saas application logs","author":"sarkar","year":"2014","journal-title":"Tenth European Dependable Computing Conference (EDCC 2014)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.24"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.30"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575304"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.24"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.76"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952699"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"journal-title":"The Importance of 'Big Data' A Definition","year":"2012","author":"beyer","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DEPEND.2009.22"},{"key":"7","first-page":"19","article-title":"Proactive recovery in a byzantinefault-tolerant system","author":"castro","year":"2000","journal-title":"Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation-Volume 4 Ser OSDI'00"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.52"},{"key":"5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/3-540-45177-3_1","article-title":"Intrusion-tolerant architectures: Concepts and design","volume":"2677","author":"verissimo","year":"2003","journal-title":"Architecting Dependable Systems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2013.53"},{"key":"8","first-page":"1","article-title":"A survey on software defined networking (sdn) and openflow: From concept to implementation","author":"hu","year":"2014","journal-title":"Communications Surveys Tutorials IEEE"}],"event":{"name":"2014 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","start":{"date-parts":[[2014,11,3]]},"location":"Naples, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Symposium on Software Reliability Engineering Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982004\/6983760\/06983796.pdf?arnumber=6983796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:37:31Z","timestamp":1602686251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6983796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/issrew.2014.53","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}