{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:51:21Z","timestamp":1730299881878,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/sysose.2011.5966566","type":"proceedings-article","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T01:43:19Z","timestamp":1312422199000},"page":"13-18","source":"Crossref","is-referenced-by-count":10,"title":["Managing runtime re-engineering of a System-of-Systems for cyber security"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Waller","sequence":"first","affiliation":[]},{"given":"Rachel","family":"Craddock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Distributed Publish\/Subscribe (Pub\/Sub) Event System","year":"2011","key":"ref39"},{"journal-title":"Java Message Service","year":"2009","author":"richards","key":"ref38"},{"key":"ref33","article-title":"An Approach to Autonomizing Legacy Systems","author":"kaiser","year":"0","journal-title":"SHAMAN Self-Healing Adaptive and self-MANaged Systems"},{"key":"ref32","article-title":"Software engineering techniques for the development of systems of systems","author":"calinescu","year":"0","journal-title":"15th Monterey Workshop - Foundations of Computer Software Future Trends and Techniques for Development"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1292491.1292497"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn079"},{"key":"ref36","article-title":"Aspect Oriented Programming","author":"kiczales","year":"0","journal-title":"Proc of the European Conf on Object Oriented Programming Springer Verlag LNCS 1241"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0107"},{"key":"ref34","article-title":"Securing security policies in autonomic computing systems","author":"jabbour","year":"0","journal-title":"Int Conf Security and Management USA"},{"article-title":"A Discourse on Winning and Losing","year":"1987","author":"boyd","key":"ref10"},{"journal-title":"Information Operations","article-title":"United States Air Force Doctrine Document 2 _ 5 (AFDD 2–5)","year":"2002","key":"ref11"},{"journal-title":"OMG Data Distribution Service Portal","year":"2011","key":"ref40"},{"key":"ref12","first-page":"71","article-title":"Naval Tactical C3 Architecture, 1985–1995","volume":"33","author":"lawson","year":"1979","journal-title":"Signal"},{"article-title":"Cybersecurity Review. Background, threatscape, best-practices & resources","year":"2011","author":"debrosse","key":"ref13"},{"key":"ref14","article-title":"Forensics, Fighter Pilots & the OODA Loop","author":"dussault","year":"0","journal-title":"Digital Forensic Research Workshop"},{"article-title":"Agile Defense with NIST Controls","year":"2011","author":"fink","key":"ref15"},{"key":"ref16","article-title":"Governmental Effects upon the Cyber Security Decision Making Cycle","author":"norquist","year":"2004","journal-title":"SANS Institute White Paper"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1217256.1217266"},{"key":"ref18","article-title":"The Golden Hour of Phishing Attacks","author":"klein","year":"2010","journal-title":"Trusteer article"},{"volume":"10","journal-title":"Information Fusion","year":"2009","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.478.486"},{"key":"ref28","article-title":"Combining techniques from intelligent & decision support systems","author":"spyrou","year":"1996","journal-title":"In Perspectives on DSS Darzentas Darzentas"},{"journal-title":"US Government","article-title":"Cyber Security: A Crisis of Prioritization","year":"2005","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622002000154"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2006.1652284"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D"},{"article-title":"Secure Component Composition for Personal Ubiquitous Computing: Project Summary","year":"2005","author":"merabti","key":"ref29"},{"key":"ref8","article-title":"Applying aspect-oriented programming to security","volume":"14","author":"viefa","year":"2001","journal-title":"Cutter IT Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353324"},{"key":"ref2","article-title":"Reducing Systemic Cybersecurity Risk","author":"sommer","year":"2011","journal-title":"OECD\/IFP Project “Future Global Shocks”"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507726"},{"journal-title":"Detica & Office of Cyber Security and Information Assurance in the Cabinet Office Report","article-title":"The cost of cybercrime","year":"2011","key":"ref1"},{"article-title":"The Power of Events","year":"2002","author":"luckham","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2010.5544013"},{"year":"2010","key":"ref21","article-title":"Improvements relating to network security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10036-5"},{"year":"2011","key":"ref42","article-title":"The INTERSECTION Project"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.022"},{"key":"ref41","article-title":"What is reflective middleware?","volume":"2","author":"coulson","year":"2001","journal-title":"IEEE Distrib Syst Online"},{"key":"ref44","article-title":"OBSCURE® - Object Based Security","author":"jones","year":"0","journal-title":"TRT(UK) White Paper"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210417481"},{"article-title":"Teamworking for Security: The Collaborative Approach","year":"2009","author":"bye","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.01.053"}],"event":{"name":"2011 6th International Conference on System of Systems Engineering (SoSE)","start":{"date-parts":[[2011,6,27]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 6th International Conference on System of Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5958523\/5966563\/05966566.pdf?arnumber=5966566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:36:22Z","timestamp":1490088982000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5966566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/sysose.2011.5966566","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}