{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:44:47Z","timestamp":1725619487917},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127465","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1207-1212","source":"Crossref","is-referenced-by-count":6,"title":["Automatic security analysis using security metrics"],"prefix":"10.1109","author":[{"family":"Kun Sun","sequence":"first","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Li","sequence":"additional","affiliation":[]},{"family":"Yi Cheng","sequence":"additional","affiliation":[]},{"family":"Wei Tang","sequence":"additional","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Improving CVSS-based vulnerability prioritization with business context information(info)","author":"fruhwirth","year":"0","journal-title":"Fifth Workshop on Security Metrics (MetriCon 5 0) Washington DC 2010"},{"journal-title":"Security Technologies for Manufacturing and Control Systems Standards","year":"2004","key":"17"},{"key":"18","article-title":"Current Trends and Advances in Information Assurance Metrics","author":"seddigh","year":"0","journal-title":"Proc of the 2nd Annual Conference on Privacy Security and Trust (PST 2004) Fredericton NB Oct (2004)"},{"key":"15","article-title":"Process Control System Security Metrics State of Practice","author":"stoddard","year":"0","journal-title":"I3P Institute for Information Infrastructure Protection Research Report No 1 Aug (2005)"},{"journal-title":"Information Technology Security Techniques Code of Practice for Information Security Management","year":"2005","key":"16"},{"key":"13","article-title":"Security metrics guide for information technology systems","author":"swanson","year":"2003","journal-title":"NIST Special Publication 800-55"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174904"},{"journal-title":"JFreeChart","year":"0","key":"11"},{"journal-title":"NIST Special Publication 500-133","article-title":"Technology assessment: Methods for measuring the level of computer security","year":"1985","key":"12"},{"journal-title":"Nessus Vulnerability Scanner","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558636"},{"journal-title":"National vulnerability database (NVD)","year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753203"},{"journal-title":"Vulnerability Summary for CVE-2009-0022","year":"0","key":"10"},{"journal-title":"Vulnerability Protection A Buffer for Patching A Lucid Security Technical White Paper","year":"2004","author":"phatak","key":"7"},{"journal-title":"The CIS Security Metrics","year":"0","key":"6"},{"journal-title":"Security Metrics Replacing Fear Uncertainty and Doubt","year":"2007","author":"jaquith","key":"5"},{"journal-title":"Common Vulnerability Scoring System (CVSS)","year":"0","key":"4"},{"journal-title":"Analytic Hierarchy Process (AHP)","year":"0","key":"9"},{"journal-title":"Analytic Hierarchy Process (AHP) Tutorial","year":"0","author":"teknomo","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127465.pdf?arnumber=6127465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:40:04Z","timestamp":1490092804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127465","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}