{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:11:45Z","timestamp":1729624305722,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/cicybs.2009.4925092","type":"proceedings-article","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T19:53:08Z","timestamp":1242762788000},"page":"69-75","source":"Crossref","is-referenced-by-count":12,"title":["Managing complex IT security processes with value based measures"],"prefix":"10.1109","author":[{"given":"Robert K.","family":"Abercrombie","sequence":"first","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Mili","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"720","author":"mcclure","year":"2009","journal-title":"Hacking Exposed Network Security Secrets and Solutions 6th ed"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/0471723908"},{"journal-title":"Internet System Security Xforce Database","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.141"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.82"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/1370099.1370103","article-title":"developing a sse-cmmbased security risk assessment process for patient-centered healthcare systems","author":"huang","year":"2008","journal-title":"Proceedings of the 6th International Workshop on Software Quality"},{"key":"14","first-page":"3495115","article-title":"risk management using behavior based bayesian networks","author":"dantu","year":"2005","journal-title":"Proceedings of IEEE International Conference on Intelligence and Security Informatics"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.006"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370234"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"journal-title":"Department of Defense Trusted Computer System Evaluation Criteria","year":"1985","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF03168315"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"24","article-title":"the delphi method, i : an experimental study of group opinion","author":"dalkey","year":"1969","journal-title":"Rand Corp"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413188"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.308"},{"key":"27","first-page":"10","article-title":"challenging the mean time to failure: measuring dependability as a mean failure cost","volume":"42","author":"mili","year":"2009","journal-title":"Proceedings of 42nd Hawaii International Conference on System Sciences"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185215"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-29263-2"},{"key":"10","first-page":"60","article-title":"a case study on value-based requirements tracing","author":"heindl","year":"2005","journal-title":"ESEC\/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.42"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1107656.1107658"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ESC.2007.3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134288"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/638750.638775","article-title":"value based software engineering: reinventing earned value monitoring and control","volume":"28","author":"boehm","year":"2003","journal-title":"ACM Software Engineering Notes"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134442"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553675"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","start":{"date-parts":[[2009,3,30]]},"location":"Nashville, TN, USA","end":{"date-parts":[[2009,4,2]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence in Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4910763\/4925076\/04925092.pdf?arnumber=4925092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T23:06:02Z","timestamp":1633475162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4925092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2009.4925092","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}