{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:29:20Z","timestamp":1740101360337,"version":"3.37.3"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041303","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"31-36","source":"Crossref","is-referenced-by-count":0,"title":["Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0691-8931","authenticated-orcid":false,"given":"Ghanshyam S.","family":"Bopche","sequence":"first","affiliation":[{"name":"National Institute of Technology,Department of Computer Applications,Tiruchirappalli,India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2105-6578","authenticated-orcid":false,"given":"Deepnarayan","family":"Tiwari","sequence":"additional","affiliation":[{"name":"National Payments Corporation of India (NPCI),Mumbai,India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0232-321X","authenticated-orcid":false,"given":"Gopal N.","family":"Rai","sequence":"additional","affiliation":[{"name":"Collins Aerospace India (Pvt.) Limited,Hyderabad,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.002"},{"volume-title":"NetSPA: a network security planning architecture","year":"2002","author":"Artz","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30101-1_17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228667"},{"volume-title":"Cauldron by CyVision","key":"ref7"},{"volume-title":"FireMon Risk Analyzer","key":"ref8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05171-6_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102938"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00533-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.58"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.1630921"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1179494.1179502"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602117"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.24"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/69.649313"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.11.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.010"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2023,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041303.pdf?arnumber=10041303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:38:04Z","timestamp":1707835084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041303","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}