{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:40:15Z","timestamp":1756320015955,"version":"3.44.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130015","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"186-193","source":"Crossref","is-referenced-by-count":0,"title":["Optimized Security Measure Selection: Leveraging MILP Solvers To Balance Risk And Cost"],"prefix":"10.1109","author":[{"given":"Pierre Saha","family":"Fobougong","sequence":"first","affiliation":[{"name":"Laval University,Faculty of Science and Engineering,Qu&#x00E9;bec,Canada"}]},{"given":"Mohamed","family":"Mejri","sequence":"additional","affiliation":[{"name":"Laval University,Faculty of Science and Engineering,Qu&#x00E9;bec,Canada"}]},{"given":"Kamel","family":"Adi","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; du Qu&#x00E9;bec &#x00E0; Outaouais,Computer Security Research Laboratory,Qu&#x00E9;bec,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b17776"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2401"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSO.2011.43"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753520"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2015.1057205"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2107556.2107561"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.165.1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.625"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/app12115653"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225513"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00899-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2023.49311"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17212\/2782-2230-2024-1-42-51"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3497011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167414"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS59941.2024.10639949"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679445"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/IST-Africa63983.2024.10569804"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.54254\/2753-8818\/41\/20240642"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-024-02130-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2024.110835"},{"key":"ref25","article-title":"A gnn-guided predict-and-search framework for mixed-integer linear programming","author":"Han","year":"2023","journal-title":"arXiv:2302.05636"},{"issue":"1","key":"ref26","first-page":"18721882","article-title":"Methods and solvers used for solving mixed integer linear programming and mixed nonlinear programming problems: A review","volume":"9","author":"Kumar","year":"2020","journal-title":"Int. J. Sci. Technol. Res"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)87829-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3433404"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130015.pdf?arnumber=11130015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:20Z","timestamp":1756318820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130015","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}