{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:34Z","timestamp":1754157694972,"version":"3.41.2"},"reference-count":16,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1108\/09685220510602004","type":"journal-article","created":{"date-parts":[[2005,6,22]],"date-time":"2005-06-22T02:12:51Z","timestamp":1119406371000},"page":"182-188","source":"Crossref","is-referenced-by-count":2,"title":["System survivability: a critical security problem"],"prefix":"10.1108","volume":"13","author":[{"given":"J.","family":"Redman","sequence":"first","affiliation":[]},{"given":"M.","family":"Warren","sequence":"additional","affiliation":[]},{"given":"W.","family":"Hutchinson","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"volume-title":"Information survivability: required shifts in perspective","year":"2002","author":"Allen J.H.","key":"p_1"},{"volume-title":"Survivable systems analysis method","year":"2001","author":"CERTq Coordination Center and Carnegie Mellon University","key":"p_2"},{"volume-title":"Simulating the emergent behavior of complex software-intensive organizations","year":"2000","author":"Christie A.M.","key":"p_3"},{"volume-title":"Using EASEL to study complex systems","year":"2001","author":"DeSantis M.","key":"p_4"},{"volume-title":"Foundations for survivable systems engineering","year":"2002","author":"Ellison R.J.","key":"p_5"},{"volume-title":"An approach to survivable systems","year":"1999","author":"Ellison R.J.","key":"p_6"},{"volume-title":"Survivable network systems: an emerging discipline","year":"1999","author":"Ellison R.J.","key":"p_7"},{"volume-title":"Survivability: protecting your critical systems","year":"2002","author":"Ellison R.J.","key":"p_8"},{"volume-title":"Design and implementation of EASEL","year":"1999","author":"Fisher D.A.","key":"p_9"},{"volume-title":"Survivability and simulation","year":"2000","author":"Fisher D.A.","key":"p_10"},{"volume-title":"Survivability - a new technical and business perspective on security, available at: www.cert.org\/archive\/pdf\/busperspec.pdf","year":"1999","author":"Lipson H.F.","key":"p_11"},{"volume-title":"February, available at: www.cert.org\/easel\/lrm\/index.html","year":"2002","author":"Christie A.M.","key":"p_12"},{"volume-title":"The survivability imperative: protecting critical systems","year":"2000","author":"Ellison R.J.","key":"p_13"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772824"},{"volume-title":"A research agenda for survivable systems","year":"2000","author":"Linger R.C.","key":"p_15"},{"volume-title":"A simulation environment for survivability algorithms","year":"2002","author":"Shimeall T.","key":"p_16"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510602004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510602004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:54Z","timestamp":1753402134000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/3\/182-188\/183406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1108\/09685220510602004"],"URL":"https:\/\/doi.org\/10.1108\/09685220510602004","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,7]]}}}