{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:24:40Z","timestamp":1767007480335},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528209","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:27:58Z","timestamp":1470421678000},"page":"285-290","source":"Crossref","is-referenced-by-count":4,"title":["A new framework for enhanced measurable cybersecurity in computer networks"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Gheorghica","sequence":"first","affiliation":[]},{"given":"Victor","family":"Croitoru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Product documentation Check Point Security Report 2015 Check Point","year":"2015","key":"ref4"},{"journal-title":"Ponemon Institue - Defining the Gap The Cybersecurity Governance Study","year":"2015","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Integrated evaluation of probabilistic security and probabilistic adequacy of bulk power system based on Monte-Carlo simulation","author":"yunting","year":"2010","journal-title":"Power System Technology (POWERCON) 2010 International Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2014.136"},{"journal-title":"US-CERT Information Sharing Specifications for Cybersecurity","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753203"},{"journal-title":"Network security first-step","year":"2004","author":"thomas","key":"ref2"},{"journal-title":"ISO\/IEC 27032 2012 Information technology - Security techniques - Guidelines for cybersecurity","year":"0","key":"ref1"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528209.pdf?arnumber=7528209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T02:12:17Z","timestamp":1474855937000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528209","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}