{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:36:56Z","timestamp":1725532616923},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icitst.2015.7412104","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:35:10Z","timestamp":1456486510000},"page":"270-276","source":"Crossref","is-referenced-by-count":3,"title":["SCAP benchmark for Cisco router security configuration compliance"],"prefix":"10.1109","author":[{"given":"Chit Nyi Nyi","family":"Hlyne","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Butakov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cisco","article-title":"Security Automation Using OVAL","year":"2014","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2011.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682760"},{"year":"2011","key":"ref13","article-title":"NIST SP 800-70 Revision 2: &#x201C;Guidelines for Checklist users and developer"},{"year":"2012","key":"ref4","article-title":"Cisco IOS Security Configuration Benchmark: The Center of Internet Security"},{"year":"2015","key":"ref3","article-title":"National Security Agency: &#x201C;Router Security Configuration Guide"},{"journal-title":"MITRE","article-title":"Open Vulnerability and Assessment Language (OVAL)","year":"0","key":"ref6"},{"year":"2011","key":"ref5","article-title":"NIST -Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SafeConfig.2011.6111674"},{"year":"0","key":"ref7","article-title":"NIST: Common Platform Emuneration (CPE)"},{"year":"2015","key":"ref2","article-title":"Security Technical Implementation Guides (STIGs)"},{"year":"2011","key":"ref1","article-title":"The Technical Specification for the Security Content Automation Protocol (SCAP)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.39"}],"event":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2015,12,14]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7400833\/7412034\/07412104.pdf?arnumber=7412104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:19:30Z","timestamp":1490087970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7412104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icitst.2015.7412104","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}