{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T11:58:57Z","timestamp":1756382337541,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928023","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Resilience Modelling for the Operations of Hybrid Network"],"prefix":"10.1109","author":[{"given":"Attiq","family":"Ur-Rehman","sequence":"first","affiliation":[{"name":"Federation University,Centre for Smart Analytics,Mt Helen,Australia"}]},{"given":"Joarder","family":"Kamruzzuman","sequence":"additional","affiliation":[{"name":"Federation University,Centre for Smart Analytics,Mt Helen,Australia"}]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[{"name":"RMIT University,Cloud. Systems and Security Discipline SCT-STEM,Melbourne,Australia"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"Flinders University,College of Science and Engineering,Adelaide,Australia"}]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Assessments: Cyber Resilience Review (CRR)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09528-w"},{"key":"ref12","first-page":"1","article-title":"Fundamental Concepts of Cyber Resilience: Introduction and Overview","author":"linkov","year":"2018","journal-title":"Cyber Resilience of Systems and Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.03.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1302\/2\/022069"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680128"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551486"},{"key":"ref17","first-page":"102","article-title":"Facilitating Pre-Service Mathematics Teachers&#x2019; Understanding of Directly and Inversely Proportional Relationships Using Hands-On and Real-World Problems","volume":"5","author":"arican","year":"2019","journal-title":"International Journal of Research in Education and Science"},{"key":"ref18","first-page":"95","article-title":"Feature scaling in support vector data description","author":"juszczak","year":"2002","journal-title":"Proc ASCI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755005"},{"key":"ref4","article-title":"Cyber Resiliency Metrics and Scoring in Practice","author":"dj","year":"2018","journal-title":"MITRE CORP BEDFORD MA"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.2988330"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9021076"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s00146-020-01023-w","article-title":"IIoT and cyber-resilience","volume":"36","author":"sebastian","year":"2021","journal-title":"AI & Society"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12360"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2021.09.008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106829"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnlest.2020.100059"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-021-00230-w"},{"key":"ref20","article-title":"The national vulnerability database (nvd)","author":"booth","year":"0","journal-title":"Open64 Overview [Online]"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09928023.pdf?arnumber=9928023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:50Z","timestamp":1674504770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9928023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928023","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}