{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:03:20Z","timestamp":1760609000037,"version":"3.41.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N022866\/1"],"award-info":[{"award-number":["EP\/N022866\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011200","name":"EU FP7 SPARKS Project","doi-asserted-by":"publisher","award":["608224"],"award-info":[{"award-number":["608224"]}],"id":[{"id":"10.13039\/100011200","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2718498","type":"journal-article","created":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:16:25Z","timestamp":1498155385000},"page":"17149-17164","source":"Crossref","is-referenced-by-count":12,"title":["Evidential Network Modeling for Cyber-Physical System State Inference"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4321-3597","authenticated-orcid":false,"given":"Ivo","family":"Friedberg","sequence":"first","affiliation":[]},{"given":"Xin","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"Mclaughlin","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Engineering a Safer World&#x2014;Systems Thinking Applied to Safety","year":"2011","author":"leveson","key":"ref33"},{"journal-title":"Failure Mode and Effect Analysis FMEA from Theory to Execution","year":"2003","author":"stamatis","key":"ref32"},{"key":"ref31","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref30","first-page":"29","article-title":"Constructing the pignistic probability function in a context of uncertainty","author":"smets","year":"1990","journal-title":"Proc UAI"},{"key":"ref36","first-page":"83","article-title":"Valuation-based systems: A framework for managing uncertainty in expert systems","author":"shenoy","year":"1992","journal-title":"Fuzzy Logic for the Management of Uncertainty"},{"article-title":"Evaluating host intrusion detection systems","year":"2007","author":"molina","key":"ref35"},{"journal-title":"Systems and Software Engineering&#x2014;Vocabulary","first-page":"1","year":"2010","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.05.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046694"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.123"},{"key":"ref13","first-page":"1627","article-title":"Intrusion detection engine based on Dempster&#x2013;Shafer&#x2019;s theory of evidence","author":"hu","year":"2006","journal-title":"Proc IEEE Int Conf Commun Circuits Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557562"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.53"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.12.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(93)90005-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.31"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/int.10076"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.151"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2005.1541455"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(89)90009-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2009.5089545"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011868"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2245155"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-319-03584-0_14","article-title":"Alert correlation algorithms: A survey and taxonomy","author":"mirheidari","year":"2013","journal-title":"Cyberspace Safety and Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.10.017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.29"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2014.08.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/1748006X12475044"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2010.5603480"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2016.14"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/07954957.pdf?arnumber=7954957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T23:02:59Z","timestamp":1750374179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7954957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2718498","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}