{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:14:28Z","timestamp":1746591268577,"version":"3.40.5"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031874987"},{"type":"electronic","value":"9783031874994"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87499-4_13","type":"book-chapter","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:20:53Z","timestamp":1746184853000},"page":"202-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Tool for\u00a0Enabling Scalable Automation in\u00a0Security Control Selection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3606-5370","authenticated-orcid":false,"given":"Dylan","family":"L\u00e9veill\u00e9","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,1]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1080\/12460125.2018.1468177","volume":"27","author":"L Almeida","year":"2018","unstructured":"Almeida, L., Resp\u00edcio, A.: Decision support for selecting information security controls. J. Decis. Syst. 27, 173\u2013180 (2018)","journal-title":"J. Decis. Syst."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Dewri, R., Poolsappasit, N., Ray, I., Whitley, D.: Optimal security hardening using multi-objective optimization on attack tree models of networks. In: 14th ACM Conference on Computer and Communications Security, pp. 204\u2013213 (2007)","DOI":"10.1145\/1315245.1315272"},{"key":"13_CR3","unstructured":"Government of Canada: IT Security Risk Management: A Lifecycle Approach \u2013 Security Control Catalogue. https:\/\/www.cisecurity.org\/controls\/v8, Accessed 29 Aug 2024 (2014)"},{"key":"13_CR4","unstructured":"International Organization for Standardization: ISO\/IEC 27002:2022 Information security, cybersecurity and privacy protection \u2013 Information security controls. https:\/\/www.iso.org\/standard\/75652.html Accessed 29 Aug 2024, February 2022"},{"key":"13_CR5","unstructured":"Joint Task Force Interagency Working Group: Risk management framework for information systems and organizations: A system life cycle approach for security and privacy. Special Publication (NIST SP) 800-37 Revision 2, National Institute of Standards and Technology, December 2018"},{"key":"13_CR6","unstructured":"Joint Task Force Interagency Working Group: Security and privacy controls for information systems and organizations. Special Publication (NIST SP) 800-53 Revision 5, National Institute of Standards and Technology, September 2020"},{"key":"13_CR7","unstructured":"Kaloroumakis, P., Smith, M.: Toward a knowledge graph of cybersecurity countermeasures. Technical Report, The MITRE Corporation, April 2020"},{"issue":"3","key":"13_CR8","first-page":"538","volume":"41","author":"B Korte","year":"2001","unstructured":"Korte, B., Vygen, J.: Combinatorial optimization: theory and algorithms. Comput. Math. Appl. 41(3), 538 (2001)","journal-title":"Comput. Math. Appl."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"L\u00e9veill\u00e9, D., Jaskolka, J.: A game-theoretic approach for security control selection. In: 15th International Symposium on Games, Automata, Logics and Formal Verification. GandALF 2024, vol.\u00a0409, pp. 103\u2013119. Electronic Proceedings in Theoretical Computer Science, Reykjavic, Iceland (2024)","DOI":"10.4204\/EPTCS.409.11"},{"key":"13_CR10","unstructured":"NumFOCUS, Inc.: pandas - python data analysis library. https:\/\/pandas.pydata.org\/, Accessed 29 Aug 2024 (2024)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Pan, X., Zhang, T.: Comparison and analysis of algorithms for the 0\/1 knapsack problem. J. Phys. Conf. Ser. 1069(1) (2018)","DOI":"10.1088\/1742-6596\/1069\/1\/012024"},{"issue":"1","key":"13_CR12","first-page":"61","volume":"16","author":"JY Park","year":"2020","unstructured":"Park, J.Y., Huh, E.N.: A cost-optimization scheme using security vulnerability measurement for efficient security enhancement. J. Inf. Process. Syst. 16(1), 61\u201382 (2020)","journal-title":"J. Inf. Process. Syst."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., Mcquaid, R.: Developing cyber-resilient systems: a systems security engineering approach. Special Publication (NIST SP) 800-160, Volume 2 Revision 1, National Institute of Standards and Technology, December 2021","DOI":"10.6028\/NIST.SP.800-160v2r1"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1108\/ICS-12-2013-0090","volume":"23","author":"M Shahpasand","year":"2015","unstructured":"Shahpasand, M., Shajari, M., Golpaygani, S.A.H., Ghavamipoor, H.: A comprehensive security control selection model for inter-dependent organizational assets structure. Inf. Comput. Secur. 23(2), 218\u2013242 (2015)","journal-title":"Inf. Comput. Secur."},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.procs.2015.08.625","volume":"64","author":"I Yevseyeva","year":"2015","unstructured":"Yevseyeva, I., Basto-Fernandes, V., Emmerich, M., Van Moorsel, A.: Selecting optimal subset of security controls. Procedia Comput. Sci. 64, 1035\u20131042 (2015)","journal-title":"Procedia Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87499-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:30:21Z","timestamp":1746520221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87499-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031874987","9783031874994"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montr\u00e9al, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fps-2024.hec.ca\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}