{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:11:59Z","timestamp":1764079919963},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,31]]},"DOI":"10.1109\/csr57506.2023.10224958","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T13:50:16Z","timestamp":1693230616000},"page":"295-300","source":"Crossref","is-referenced-by-count":6,"title":["Understanding Resilience: Looking at Frameworks &amp; Standards - A Systematic Study from Cyber Perspective"],"prefix":"10.1109","volume":"9825","author":[{"given":"Nishanth","family":"Laxman","sequence":"first","affiliation":[{"name":"Fraunhofer IESE,Kaiserslautern,Germany,67663"}]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[{"name":"Fraunhofer IESE,Kaiserslautern,Germany,67663"}]},{"given":"Markus","family":"Damm","sequence":"additional","affiliation":[{"name":"Fraunhofer IESE,Kaiserslautern,Germany,67663"}]},{"given":"Reinhard","family":"Schwarz","sequence":"additional","affiliation":[{"name":"Fraunhofer IESE,Kaiserslautern,Germany,67663"}]},{"given":"Pablo Oliveira","family":"Antonino","sequence":"additional","affiliation":[{"name":"Fraunhofer IESE,Kaiserslautern,Germany,67663"}]}],"member":"263","reference":[{"key":"ref13","first-page":"127","article-title":"Botgrab-ber: Svm-based self-adaptive system for the network resilience against the botnets' cyberattacks","author":"lysenko","year":"2019","journal-title":"Computer Networks 26th International Conference CN 2019 Kamien Slaski Poland June 25&#x2013;27 2019 Proceedings 26"},{"year":"2007","author":"keele","journal-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TNSM.2018.2828938"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ISCC.2016.7543771"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SERVICES48979.2020.00048"},{"key":"ref10","first-page":"156","article-title":"Quantifying and measuring cyber resiliency","volume":"9825","author":"cybenko","year":"2016","journal-title":"Sen-sors and Command Control Communications and Intelligence (C3I) Technologies for Homeland Security Defense and Law Enforcement Applications XV"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1146\/annurev.es.04.110173.000245"},{"key":"ref1","article-title":"Cyber-resilience approaches for cyber-physical systems","author":"segovia-ferreira","year":"2023","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ISCC.2015.7405566"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/THS.2016.7568889"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.6028\/NIST.SP.800-160v2"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISRCS.2013.6623772"},{"year":"2022","journal-title":"Technical report Department of Homeland Security","article-title":"Resilient positioning, navigation, and timing (pnt) conformance frame-work version 2.0","key":"ref24"},{"year":"2017","journal-title":"Frost & Sullivan Tech Rep","article-title":"Exploring cyber security maturity in asia","key":"ref23"},{"year":"2016","journal-title":"CIPM-IOSCO Tech Rep","article-title":"Guidance on cyber resilience for financial market infrastructures","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/JPROC.2017.2686394"},{"key":"ref20","article-title":"Cyber resiliency engineering framework","author":"bodeau","year":"2011","journal-title":"in Technical rept MITRE CORP BEDFORD MASS"},{"key":"ref22","article-title":"Platform firmware resiliency guidelines","author":"regenscheid","year":"2017","journal-title":"National Institute of Standards and Technology Tech Rep"},{"key":"ref21","article-title":"Measurement frameworks and metrics for resilient networks and services: Technical report, european network and information security agency (enisa)","author":"trimintzios","year":"2011","journal-title":"technical report Feb Tech Rep"},{"year":"2016","journal-title":"Cisco Tech Rep","article-title":"Cisco: Cyber resilience: Safeguarding the digital organization","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3549073"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3519262"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INFORMATICS.2017.8327227"},{"year":"2006","author":"hollnagel","journal-title":"Resilience Engineering Concepts and Precepts","key":"ref4"},{"key":"ref3","first-page":"8g","article-title":"From dependability to resilience","author":"laprie","year":"2008","journal-title":"38th IEEE\/IFIP Int Conf on Dependable Systems and Networks"},{"key":"ref6","first-page":"562","article-title":"A principle for resilient sharing of distributed resources","author":"alsberg","year":"1976","journal-title":"Proceedings of the 2nd International Conference on Software Engineering"},{"key":"ref5","article-title":"The quest for resilience","author":"hamel","year":"2017","journal-title":"Tech Rep"}],"event":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2023,7,31]]},"location":"Venice, Italy","end":{"date-parts":[[2023,8,2]]}},"container-title":["2023 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224900\/10224823\/10224958.pdf?arnumber=10224958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T13:51:16Z","timestamp":1695649876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/csr57506.2023.10224958","relation":{},"subject":[],"published":{"date-parts":[[2023,7,31]]}}}