{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:17Z","timestamp":1756271417373,"version":"3.44.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130141","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"737-744","source":"Crossref","is-referenced-by-count":0,"title":["Addressing the Economics of Critical National Infrastructure (CNI) Security"],"prefix":"10.1109","author":[{"given":"Siraj Ahmed","family":"Shaikh","sequence":"first","affiliation":[{"name":"Swansea University,Systems Security Group (SSG),Department of Computer Science,Swansea,United Kingdom,SA1 8EN"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100464"},{"year":"2025","key":"ref2","article-title":"Scarlet Design"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.48"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/13563467.2022.2084521"},{"article-title":"Foreign involvement in the critical national infrastructure: the implications for National Security","year":"2013","author":"Rifkind","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780190228637.013.115"},{"key":"ref9","article-title":"A taxonomy of threats for complex risk management","author":"Coburn","year":"2014","journal-title":"Cambridge Risk Framework series"},{"article-title":"Cambridge taxonomy of business risks","year":"2019","author":"Copic","key":"ref10"},{"year":"2025","key":"ref11","article-title":"National Protective Security Authority"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2346.12706"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiae236"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyad018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3419101"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2020.101827"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3055231"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/1972412"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-137-00772-8_516"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/1364557032000119616"},{"key":"ref21","first-page":"188220","article-title":"Synthesising research evidence","author":"Mays","year":"2001","journal-title":"Studying the organisation and delivery of health services: research methods"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(01)00035-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.1998.10846874"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1037\/qup0000196"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp0630a"},{"year":"2025","key":"ref26","article-title":"UK Rail Research and Innovation Network (UKRRIN)"},{"year":"2024","key":"ref27","article-title":"UK Rail Research and Innovation Network (UKRRIN)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiae124"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102145"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiae231"},{"year":"2025","key":"ref33","article-title":"National Cyber Strategy 2022"},{"key":"ref34","article-title":"An Introduction to CHERI","volume-title":"Tech. Rep. UCAM-CL-TR-941","author":"Watson","year":"2019"},{"year":"2025","key":"ref35","article-title":"CHERI adoption and diffusion research"},{"year":"2025","key":"ref36","article-title":"National semiconductor strategy"},{"year":"2025","key":"ref37","article-title":"CHERI Alliance formed to promote memory security tech... but where\u2019s Arm?"},{"key":"ref38","article-title":"Shapeshifting in UK Infrastructure Finance and the Limits of Regulation","author":"Van Waeyenberge","year":"2021","journal-title":"london: esrc\/niesr rebuilding macroeconomics network working paper 61"},{"year":"2024","key":"ref39","article-title":"National Security and Investment Act 2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4337\/clj.2022.03.03"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/17280_2023_6"},{"key":"ref42","article-title":"Cyber insurance and the cyber security challenge","volume-title":"technical report","author":"MacColl","year":"2021"},{"year":"2024","key":"ref43","article-title":"National Critical Functions Set"},{"year":"2025","key":"ref44","article-title":"Lloyds Market Bulletin: State backed cyber-attack exclusions (Y5381)"},{"key":"ref45","first-page":"1595","article-title":"Notpetya, not warfare: rethinking the insurance war exclusion in the context of international cyberattacks","volume":"95","author":"Wan","year":"2020","journal-title":"Wash. L. Rev"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2023.2279033"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103886"},{"year":"2025","key":"ref48","article-title":"CC5-How can we accelerate the adoption of modern security mitigations into OT?"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130141.pdf?arnumber=11130141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:54:18Z","timestamp":1756270458000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130141","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}