{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:20:23Z","timestamp":1760142023319,"version":"build-2065373602"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185835","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"565-568","source":"Crossref","is-referenced-by-count":0,"title":["A Weighted Expert-Based Method for Asset Criticality Assessment in Cyber Risk Evaluation"],"prefix":"10.1109","author":[{"given":"Tetiana","family":"Korobeinikova","sequence":"first","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Bohdan","family":"Shapovalov","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Ihor","family":"Zhuravel","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Oleksandr","family":"Romanyuk","sequence":"additional","affiliation":[{"name":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"}]},{"given":"Roman","family":"Chekhmestruk","sequence":"additional","affiliation":[{"name":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"}]},{"given":"Anatoliy","family":"Snigur","sequence":"additional","affiliation":[{"name":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"}]}],"member":"263","reference":[{"volume-title":"Guide for conducting risk assessments (NIST Special Publication 800-30, Rev. 1)","year":"2012","key":"ref1"},{"article-title":"Risk Analysis (O-RA) Standard: Factor Analysis of Information Risk (FAIR) (Technical Standard C13G)","volume-title":"Author","year":"2013","key":"ref2"},{"issue":"3","key":"ref3","first-page":"1092","article-title":"Multi-criteria decision making for risk management in quality management systems","volume-title":"Sustainability","volume":"17","author":"Yazo-Cabuya","year":"2025"},{"key":"ref4","article-title":"A cybersecurity risk assessment methodology for industrial automation control systems","volume-title":"International Journal of Information Security","volume":"24","author":"Brancati","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-025-01009-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app15052751"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104268"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.28945\/4837"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/jcp4040042"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/acit58437.2023.10275626"},{"key":"ref11","first-page":"565","article-title":"Assessing network security risks: A technological chain perspective","volume-title":"Proceedings of the 2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","author":"Korobeinikova"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185835.pdf?arnumber=11185835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:18:28Z","timestamp":1760073508000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185835","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}