{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:13:51Z","timestamp":1767165231555,"version":"build-2238731810"},"update-to":[{"DOI":"10.1109\/fuzz.2003.1206609","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T00:00:00Z","timestamp":1056499200000},"record-id":"45190"}],"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/fuzz.2003.1206609","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T14:24:01Z","timestamp":1075818241000},"page":"1243-1248 vol.2","source":"Crossref","is-referenced-by-count":7,"title":["Notice of Violation of IEEE Publication Principles: Which models should be applied to measure computer security and information assurance?"],"prefix":"10.1109","author":[{"given":"L.","family":"Reznik","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45116-1_1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018104"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0027"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF01843568"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028390"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.1999.809499"},{"key":"ref10","article-title":"Fundamentals of Computer Security Techology","author":"amoroso","year":"1994","journal-title":"AT&T Bell Laboratories"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"ref11","article-title":"A Computational Logic, ACM monograph series","author":"boyer","year":"1979"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref13","first-page":"161","article-title":"Specifications for Multi-Level Security and a Hook-Up Property","author":"mccullough","year":"1987","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"ref14","first-page":"175","article-title":"Model of Information","author":"sutherland","year":"1986","journal-title":"Proceedings of the 9th National Computer Security Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1992-1105"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398927"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63846"},{"key":"ref18","first-page":"255","article-title":"Toward A Mathematical Foundation for Information Flow Security","volume":"3 4","author":"gray","year":"0","journal-title":"Journal of Computer Security"},{"key":"ref19","first-page":"182","article-title":"From security to safety and back","author":"stavridou","year":"1998","journal-title":"Proceedings on Computer Security Dependability and Assurance From Needs to Solutions"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130780"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSDA.1998.798360"},{"key":"ref27","first-page":"382","article-title":"The Byzantine General Problem","volume":"4","author":"lamport","year":"1982","journal-title":"Journal of the ACM"},{"key":"ref3","article-title":"Survivable Systems: An Emerging Discipline","author":"ellison","year":"1999","journal-title":"Proceedings of the 11 th Canadian Information Technology Security Symposium (CITSS)"},{"key":"ref6","article-title":"Protection","volume":"8","author":"lampson","year":"1971","journal-title":"Proceedings of the Fifth Princeton Symposium on Information Science and Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58426-9_122"},{"key":"ref5","article-title":"Introduction to software reliability; A state of the art review","author":"walker","year":"1996","journal-title":"Reliability Analysis Center Report SWREL"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1992-1103"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90065-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283743"},{"key":"ref9","year":"1985","journal-title":"National Computer Security Center Department of Defense Trusted Computer Security Evaluation Criteria Technical Report Dod 5200 28 STD NCSC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772824"},{"key":"ref46","article-title":"Method of Complexing of Measurements","volume":"47","author":"reznik","year":"1986","journal-title":"USSR Patent Bulletin of Patents"},{"key":"ref20","article-title":"Security Models. Encyclopedia of Software Engineering","author":"mclean","year":"1994"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0263-2241(85)90013-2"},{"key":"ref48","article-title":"Use of Fuzzy Expert's Information in Measurement and What We Can Gain from Its Application in Geophysics (to appear in these proceedings)","author":"reznik","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10013"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1109\/36.841983","article-title":"Satellite sensor image classification using cascaded architecture of neural fuzzy network","volume":"38","author":"lin","year":"2000","journal-title":"IEEE Transactions on Geoscience & Remote Sensing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.1998.667915"},{"key":"ref42","article-title":"Evolving fuzzy classifiers for intrusion detection","author":"gomez","year":"2001","journal-title":"Proceedings of the 2002 IEEE Workshop on Information Assurance US Military Academy"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63848"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018105"},{"key":"ref23","first-page":"180","article-title":"Security Models and Information Row","author":"mclean","year":"1990","journal-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/3468.477860"},{"key":"ref26","first-page":"199","article-title":"The Primary-Backup Approach, In: Distribuud Systems","author":"budhiraja","year":"0"},{"key":"ref43","first-page":"1708","article-title":"A comparison of input representations in neural networks: a case study in intrusion detection","volume":"2","author":"liu","year":"2002","journal-title":"Proceedings of the 2002 International Joint Conference on Neural Networks"},{"key":"ref25","article-title":"Disuibuted Algorithms","author":"lynch","year":"1996"}],"updated-by":[{"DOI":"10.1109\/fuzz.2003.1206609","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T00:00:00Z","timestamp":1056499200000},"record-id":"45190"}],"event":{"name":"12th International Fuzzy Systems Conference","location":"St Louis, MO, USA","start":{"date-parts":[[2003,5,25]]},"end":{"date-parts":[[2003,5,28]]}},"container-title":["The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8573\/27148\/01206609.pdf?arnumber=1206609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T23:58:10Z","timestamp":1640217490000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1206609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/fuzz.2003.1206609","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}