{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:39:23Z","timestamp":1729618763136,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cybersa.2015.7166134","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T21:18:14Z","timestamp":1438031894000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Improving security decision under uncertainty: A multidisciplinary approach"],"prefix":"10.1109","author":[{"given":"Hashem","family":"Dehghanniri","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Letier","sequence":"additional","affiliation":[]},{"given":"Herve","family":"Borrion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1080\/17440572.2013.787927"},{"key":"ref33","article-title":"Outsmarting the terrorists","author":"clarke","year":"2006","journal-title":"Greenwood Publishing Group"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1177\/0093854807300851"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1186\/s40163-014-0002-5"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-1-4419-0245-0_14"},{"key":"ref37","article-title":"Secure and tranquil travel: Preventing crime and disorder on public transport","author":"smith","year":"2006","journal-title":"Routledge"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1111\/j.1745-9125.2008.00103.x"},{"key":"ref35","first-page":"169","article-title":"Crime and innovation: A script analysis of patterns in check forgery","volume":"16","author":"lacoste","year":"2003","journal-title":"Crime prevention studies"},{"key":"ref34","first-page":"30","article-title":"Crimes as scripts","author":"cornish","year":"1994","journal-title":"Proceedings of the international seminar on environmental criminology and crime analysis Florida Statistical Analysis Center Florida Criminal Justice Executive Institute"},{"key":"ref10","article-title":"Experiences in eliciting security requirements","author":"mead","year":"2006","journal-title":"DTIC Document Tech Rep"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1083200.1083214"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TSE.2007.70754"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/978-3-540-75563-0_26","article-title":"A goal oriented approach for modeling and analyzing security trade-offs","author":"elahi","year":"2007","journal-title":"Conceptual Modeling - ER 2007"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/RE.2005.43"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"year":"0","author":"authority","article-title":"Annual fraud indicator, 2013","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"ref18","first-page":"249","article-title":"Goal-oriented requirements engineering: A guided tour","author":"van lamsweerde","year":"2001","journal-title":"Requirements Engineering 2001 Proceedings Fifth IEEE International Symposium On IEEE"},{"year":"2009","author":"van lamsweerde","journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1177\/0022427810391540"},{"key":"ref4","first-page":"883","article-title":"Uncertainty, risk, and information value in software requirements and architecture","author":"lctier","year":"2014","journal-title":"ICSE"},{"key":"ref27","article-title":"Situational crime prevention","author":"clarke","year":"1997","journal-title":"Criminal Justice Press"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICSE.2003.1201237"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/52.903174"},{"key":"ref29","article-title":"Talking to offenders: Practical lessons for local crime prevention","author":"ekblom","year":"1991","journal-title":"Urban crime Statistical approaches and analyses International seminar held under the auspices of Ajuntament de Barcelona Forum des Collectives Territoriales Europeenes pour la Securit6 Ur-baine"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/RE.2011.6051654"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1080\/19361610.2011.580283"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-642-02463-4_20"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/0377-2217(90)90057-I"},{"key":"ref9","first-page":"396","article-title":"An object-oriented approach for modelling security scenarios","author":"le","year":"2013","journal-title":"Computer Modelling and Simulation (UKSim) 2013 UKSim 15th International Conference On IEEE"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1978802.1978812"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICRE.2004.1335648"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1002\/9780470694435","author":"aven","year":"2008","journal-title":"Risk Analysis Assessing Uncertainties Beyond Expected Values and Probabilities"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1041685.1029905"},{"key":"ref24","first-page":"151","article-title":"The procedural analysis of offending and its relevance for situational prevention","volume":"3","author":"cornish","year":"1994","journal-title":"Crime prevention studies"},{"year":"2014","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1186\/2193-7680-2-6"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1093\/bjc\/azr005"}],"event":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,9]]}},"container-title":["2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153065\/7166109\/07166134.pdf?arnumber=7166134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T15:30:31Z","timestamp":1691854231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7166134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2015.7166134","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}