{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:25Z","timestamp":1730211685782,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679396","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"480-485","source":"Crossref","is-referenced-by-count":0,"title":["The Need for Cyber-Resilience in Complex Systems"],"prefix":"10.1109","author":[{"given":"Sezen","family":"Acur","sequence":"first","affiliation":[{"name":"TNO-ESI Eindhoven,The Netherlands"}]},{"given":"Teun","family":"Hendriks","sequence":"additional","affiliation":[{"name":"TNO-ESI Eindhoven,The Netherlands"}]}],"member":"263","reference":[{"volume-title":"System Definition","year":"2024","key":"ref1"},{"volume-title":"Glossary- Definition of Safety","year":"2024","key":"ref2"},{"volume-title":"Glossary- Definition of Security","year":"2024","key":"ref3"},{"volume-title":"Forbes,\u201d Forbes","year":"2016","author":"Brewster","key":"ref4"},{"volume-title":"Glossary- Definition of Cyber Threat","year":"2024","key":"ref5"},{"volume-title":"Cyber resilience","year":"2024","key":"ref6"},{"key":"ref7","article-title":"Developing Cyber-Resilient Systems: A Systems Security Engineering Approach","volume-title":"National Institute of Standards and Technology, Gaithersburg, MD","volume":"2","year":"2021"},{"volume-title":"CREF Navigator","year":"2023","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9781394203314.ch26"},{"volume-title":"SoSECIE Webinar","year":"2020","key":"ref10"},{"volume-title":"NIST Framework 2.0","year":"2023","key":"ref11"},{"key":"ref12","article-title":"STPA Handbook","author":"Leveson","year":"2018","journal-title":"MIT, Boston, MA"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/systems7020021"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679396.pdf?arnumber=10679396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:21:19Z","timestamp":1727241679000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679396","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}