{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:13:15Z","timestamp":1768468395747,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/esem.2009.5314213","type":"proceedings-article","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T23:27:02Z","timestamp":1258414022000},"page":"564-573","source":"Crossref","is-referenced-by-count":8,"title":["Using security metrics coupled with predictive modeling and simulation to assess security processes"],"prefix":"10.1109","author":[{"given":"Yolanta","family":"Beres","sequence":"first","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Griffin","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Shiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"a complete guide to the common vulnerability scoring system version 2.0","author":"mell","year":"2007"},{"key":"22","article-title":"trends for july-december 07, volume xii","year":"2008"},{"key":"17","first-page":"2003","volume":"hpl 2003 149","author":"casassa mont","year":"0","journal-title":"On Adaptive Identity Management The Next Generation of Identity Management Technologies"},{"key":"18","article-title":"identity analytics - user provisioning case study: using modelling and simulation for policy decision support in identity management","author":"casassa mont","year":"2009","journal-title":"HP Labs Technical Report"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.42"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167295"},{"key":"14","article-title":"the role of modelling and simulation in information security: the lost ring","author":"heidari","year":"2006"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041052"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.30"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_7"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-03840-4","author":"birtwistle","year":"1979","journal-title":"Discrete Event Modelling on Simula"},{"key":"20","article-title":"iam metrics case study","author":"sudbury","year":"2006"},{"key":"2","year":"0","journal-title":"Demos2k"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162671"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/2.889093"},{"key":"5","author":"schneier","year":"0","journal-title":"Managed Security Monitoring Closing the Window of Exposure"},{"key":"4","article-title":"a structural and stochastic modelling philosophy for systems integrity","author":"pym","year":"0","journal-title":"HP Labs Technical Report Series"},{"key":"9","year":"0"},{"key":"8","article-title":"why to adopt a security metrics? a little survey","author":"atzeni","year":"2005","journal-title":"In Proc of QoP 2005"}],"event":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement (ESEM)","location":"Lake Buena Vista, FL, USA","start":{"date-parts":[[2009,10,15]]},"end":{"date-parts":[[2009,10,16]]}},"container-title":["2009 3rd International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5306516\/5314212\/05314213.pdf?arnumber=5314213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T01:50:09Z","timestamp":1497837009000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5314213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/esem.2009.5314213","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}