{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T20:30:44Z","timestamp":1723408244680},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/hpcsim.2012.6266959","type":"proceedings-article","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T14:48:48Z","timestamp":1345646928000},"source":"Crossref","is-referenced-by-count":7,"title":["A multi-objective genetic algorithm for minimising network security risk and cost"],"prefix":"10.1109","author":[{"given":"Valentina","family":"Viduto","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Bochenkov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"22","year":"2010","journal-title":"Practical Threat Analysis for Information Security Experts"},{"key":"17","author":"templeman","year":"2005","journal-title":"Information Security - Best Practice Measures for Protecting Your Business"},{"key":"23","year":"2010","journal-title":"Mitigating Internal Threats with PTA"},{"key":"18","year":"0","journal-title":"Introduction to Recommended Practices"},{"key":"15","author":"anderson","year":"1999","journal-title":"Securing the U S Defense Information Infrastructure A Proposed Approach"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.06.004"},{"key":"13","author":"mell","year":"2007","journal-title":"A Complete Guide to the Common Vulnerability Scoring System Version 2 0"},{"key":"14","year":"0","journal-title":"National Vulnerability Database Automating Vulnerability Management Security Measurement and Compliance Cheking"},{"key":"11","year":"2002","journal-title":"Risk Management Guide for Information Technology Systems SP 800-30 Recommendations of the National Institute of Standards and Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.04.001"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16544-3","author":"neumann","year":"2010","journal-title":"Natural Computing Series"},{"key":"3","first-page":"477","article-title":"Interactive selection of iso 27001 controls under multiple objectives","author":"neubauer","year":"2008","journal-title":"Sec"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00104-7"},{"key":"2","year":"2010","journal-title":"Annual Study U K Enterprise Encryption Trends"},{"key":"1","author":"maple","year":"2010","journal-title":"UK Security Breach Investigations Report"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2009.90"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.46"},{"key":"6","author":"soo hoo","year":"2000","journal-title":"How Much is Enough A Risk Management Approach to Computer Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.478"},{"key":"4","year":"2010","journal-title":"Is Your IT Strategy Optimized for Risk Management"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.02.013"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.89"}],"event":{"name":"2012 International Conference on High Performance Computing & Simulation (HPCS)","location":"Madrid, Spain","start":{"date-parts":[[2012,7,2]]},"end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6260982\/6266874\/06266959.pdf?arnumber=6266959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:09:07Z","timestamp":1498000147000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6266959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2012.6266959","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}