{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:11:21Z","timestamp":1730279481965,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/ivsw.2017.8031549","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T16:47:18Z","timestamp":1505407638000},"page":"82-87","source":"Crossref","is-referenced-by-count":0,"title":["Estimating Target Distribution in security assessment models"],"prefix":"10.1109","author":[{"given":"Eli","family":"Weintraub","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070547"},{"journal-title":"Distributed and Cloud Computing","year":"2012","author":"hwang","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3103\/S0005105509040049"},{"key":"ref13","article-title":"Some Issues, Challenges and Problems of Distributed Software Systems","volume":"5","author":"mishra","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref14","article-title":"Design considerations for a cyber incident mission impact assessment process","author":"grimalia","year":"2009","journal-title":"Proceedings of the Intrnational Conference on Security and Management (SAM09) Las Vegas"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.312"},{"key":"ref4","article-title":"On risk defined as an event where the outcome is uncertain","volume":"12","author":"terje","year":"2009","journal-title":"Journal of Risk Research"},{"key":"ref3","article-title":"Recommended practice for patch management of control systems","author":"tom","year":"2008","journal-title":"Control Systems Security Program National Cyber Security Division"},{"journal-title":"The Internet Engineering Task Force Overview Activities Priorities IETF Report to ISOC BoT","year":"2006","author":"carpenter","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070423"},{"key":"ref8","article-title":"The NIST Model for Role-Based Access Control: Towards A Unified Standard","author":"sandhu","year":"1999","journal-title":"George Mason Univ"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-137"},{"key":"ref2","article-title":"Maximizing an organizations' security posture by distributedly assessing and remeding system vulnerabilities","author":"n?ez","year":"2008","journal-title":"IEEE International Conference on Networking Sensing and Control"},{"journal-title":"CVSS - A complete guide to the common vulnerability scoring system version 2 0","year":"2007","author":"mell","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2009.5188880"}],"event":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","start":{"date-parts":[[2017,7,3]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2017,7,5]]}},"container-title":["2017 IEEE 2nd International Verification and Security Workshop (IVSW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8024489\/8031534\/08031549.pdf?arnumber=8031549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:14:39Z","timestamp":1506986079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ivsw.2017.8031549","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}