{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:49:08Z","timestamp":1768531748758,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527908","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T17:35:06Z","timestamp":1630949706000},"page":"66-72","source":"Crossref","is-referenced-by-count":11,"title":["SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Rouff","sequence":"first","affiliation":[]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[]},{"given":"Roy","family":"Sterritt","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-2006-13105"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/AICCSA.2006.205142","article-title":"an innovative self-configuration approach for networked systems and applications","author":"chen","year":"2006","journal-title":"IEEE International Conference on Computer Systems and Applications 2006"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/PCCC.2003.1203684","article-title":"Autonomia: an autonomic computing environment","author":"dong","year":"2003","journal-title":"Conference Proceedings of the 2003 IEEE International Performance Computing and Communications Conference 2003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.26"},{"key":"ref14","article-title":"A trusted autonomic architecture to safeguard cyberphysical control leaf nodes and protect process integrity","author":"chiluvuri","year":"2015","journal-title":"Ph D Dissertation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035213"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01355-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1135-2_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2007.38"},{"key":"ref28","article-title":"Autonomic cyber security (ACS): The next generation paradigm to secure and protect computers, networks, applications and data","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0107"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3147234.3148137"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249053"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-150"},{"key":"ref5","article-title":"Cognitive and autonomic cyber defense","author":"maymir-ducharme","year":"2015","journal-title":"Tech Rep"},{"key":"ref8","article-title":"Autonomic intrusion response in distributed computing using big data","author":"vieira","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417865"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.13052\/rp-9788770220873"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-3038-2.ch013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3282487"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1387269.1387294"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2017.13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2345057"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_8"},{"key":"ref26","article-title":"Architectural integration patterns for autonomic management systems","author":"frey","year":"2012","journal-title":"9th IEEE International Conference and Workshops on the Engineering of Autonomic and Autonomous Systems (EASe 2012)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2619998"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527908.pdf?arnumber=9527908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:45:43Z","timestamp":1652183143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527908","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}