{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:02:13Z","timestamp":1730206933183,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949395","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"68-75","source":"Crossref","is-referenced-by-count":4,"title":["Addressing the need for independence in the CSE model"],"prefix":"10.1109","author":[{"given":"Robert K.","family":"Abercrombie","sequence":"first","affiliation":[]},{"given":"Erik M.","family":"Ferragut","sequence":"additional","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Grimaila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/0213017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511609589"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134288"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-29263-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949385"},{"article-title":"Critical foundations: Protecting america's infrastructures - the report of the president's commission on critical infrastructure protection","year":"1997","author":"marsh","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"year":"2009","key":"ref12","article-title":"A roadmap for cybersecurity research"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2010.06.004"},{"key":"ref14","first-page":"1","article-title":"Cyber security risks assessment with bayesian defense graphs and architectural models","author":"sommestad","year":"0","journal-title":"42nd Hawaii International Conference on System Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.02.002"},{"key":"ref16","article-title":"A hybrid dynamic decision making methodology for defensive information technology contingency measure selection in the presence of cyber threats","author":"grimaila","year":"2011","journal-title":"International Journal of Operations Research"},{"year":"2010","key":"ref17"},{"key":"ref18","first-page":"1","article-title":"Methodology for evaluating security controls based on key performance indicators and stakeholder mission","author":"sheldon","year":"0","journal-title":"Proceedings of 42nd Annual Hawaii International Conference on System Sciences (HICSS-42)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.61"},{"key":"ref28","first-page":"13","article-title":"Standards for security categorization of federal information and information systems","volume":"fips pub 199","year":"2004","journal-title":"FIPS"},{"key":"ref4","first-page":"800","article-title":"Risk management guide for information technology systems, recommendations of the national institute of standards and technology","author":"stoneburner","year":"2002","journal-title":"National Institute of Standards and Technology U S Department of Commerce Gaitherburg MD NIST Special Publication"},{"key":"ref27","article-title":"Nist special publication 800&#x2013;60 volume 1: Guide for mapping types of information and information systems to security categories","author":"stine","year":"2008","journal-title":"NIST Gaithersburg MD"},{"journal-title":"Information Security Protecting the Global Enterprise","year":"2000","author":"pipkin","key":"ref3"},{"journal-title":"Governance Control and Audit for Information and Related Technology","article-title":"Control objectives for information and related technology","year":"2011","key":"ref6"},{"key":"ref29","first-page":"17","article-title":"Minimum security requirements for federal information and information systems","volume":"fips pub 200","year":"2006","journal-title":"FIPS"},{"article-title":"Applying octave: Practitioners report","year":"2006","author":"woody","key":"ref5"},{"journal-title":"Comparison of Risk Management Methods and Tools","year":"2005","key":"ref8"},{"journal-title":"Inventory of Risk Management\/Risk Assessment Methods","year":"2005","key":"ref7"},{"year":"2009","key":"ref2","article-title":"Iso guide 73:2009 risk management vocabulary"},{"year":"1996","key":"ref9","article-title":"Executive order 13010"},{"first-page":"3542","article-title":"Public printing and documents","year":"2009","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-010-0123-2"},{"key":"ref22","first-page":"1","article-title":"Quantifying security threats and their impact","author":"aissa","year":"0","journal-title":"Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies"},{"key":"ref21","first-page":"1153","article-title":"A systematic comprehensive computational model for stake estimation in mission assurance","author":"abercrombie","year":"0","journal-title":"IEEE International Conference on Social Computing\/IEEE International Conference on Privacy Security Risk and Trust"},{"key":"ref24","first-page":"10","article-title":"Challenging the mean time to failure: Measuring dependability as a mean failure cost","author":"mili","year":"0","journal-title":"Proceedings of 42nd Hawaii International Conference on System Sciences (HICSS-42)"},{"journal-title":"Law of total probability","year":"2010","key":"ref23"},{"key":"ref26","first-page":"3541","article-title":"Federal information security management act of 2002","author":"fisma","year":"2002","journal-title":"44 U S C"},{"key":"ref25","first-page":"7","article-title":"Managing complex it security processes with valued based measures","author":"abercrombie","year":"0","journal-title":"2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949395.pdf?arnumber=5949395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:41:26Z","timestamp":1490078486000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949395","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}