{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:39:44Z","timestamp":1771515584191,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949398","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"92-99","source":"Crossref","is-referenced-by-count":6,"title":["An approach to the automated determination of host information value"],"prefix":"10.1109","author":[{"given":"Justin M.","family":"Beaver","sequence":"first","affiliation":[]},{"given":"Robert M.","family":"Patton","sequence":"additional","affiliation":[]},{"given":"Thomas E.","family":"Potok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A qualitative risk analysis and management tool &#x2013; CRAMM","author":"yazar","year":"2002"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/11824633_3","article-title":"Information Security Risk Assessment Model for Risk Management","author":"wawrzyniak","year":"2006","journal-title":"Trust and Privacy in Digital Business"},{"key":"ref12","article-title":"Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology","author":"stoneburner","year":"2002","journal-title":"NIST Special Publication 800-30 U S Department of Commerce"},{"key":"ref13","article-title":"An Automated Information Tracking Methodology to Enable Timely Cyber Incident Mission Impact Assessment","author":"grimaila","year":"2008","journal-title":"Proceedings of the 13th International Command and Control Research and Technology Symposium (ICCRTS)"},{"key":"ref14","article-title":"Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process","author":"caralli","year":"2007","journal-title":"Technical Report CMU\/SEI-2007-TR-12"},{"key":"ref15","article-title":"Information technology &#x2013; security techniques &#x2013;information security risk management","year":"2008","journal-title":"ISO\/IEC 27005 2008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674434929"},{"key":"ref18","first-page":"305","author":"jones","year":"1997","journal-title":"Readings in Information Retrieval"},{"key":"ref4","article-title":"Information Asset Profiling","author":"stevens","year":"2005","journal-title":"Networked Systems Survivability Program Technical Note CMU\/SEI-2005-TN-021"},{"key":"ref3","article-title":"An Analysis of Information Asset Valuation (IAV) Quantification Methodology for Application with Cyber Information Mission Impact Assessment (CIMIA)","author":"hellesen","year":"0","journal-title":"Master's thesis for the Graduate School of Engineering and Management"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2006.50"},{"key":"ref5","article-title":"How much is enough? A risk management approach to computer security","author":"soohoo","year":"2000","journal-title":"Consortium for Research on Information Security and Policy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/22952.22957"},{"key":"ref2","article-title":"Towards the Development of a Defensive Cyber Damage and Mission Impact Methodology","author":"fortson","year":"0","journal-title":"Ph D thesis for the Graduate School of Engineering and Management"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413177"},{"key":"ref9","author":"lang","year":"0","journal-title":"The 20 Newsgroups Data Set"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","location":"Paris, France","start":{"date-parts":[[2011,4,11]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949398.pdf?arnumber=5949398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:10:51Z","timestamp":1497913851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949398","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}