{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:24:02Z","timestamp":1763191442394,"version":"3.45.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11228518","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming"],"prefix":"10.1109","author":[{"given":"Shu-Jui","family":"Chang","sequence":"first","affiliation":[{"name":"Loughborough University,Computer Science,Loughborough,UK"}]},{"given":"Chris","family":"Hicks","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute,London,UK"}]},{"given":"Vasilios","family":"Mavroudis","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute,London,UK"}]},{"given":"Iain","family":"Phillips","sequence":"additional","affiliation":[{"name":"Loughborough University,Computer Science,Loughborough,UK"}]},{"given":"Tim","family":"Watson","sequence":"additional","affiliation":[{"name":"Loughborough University,Computer Science,Loughborough,UK"}]}],"member":"263","reference":[{"year":"2025","key":"ref1","article-title":"Check Point Software\u2019s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid Maturing Cyber Threat Ecosystem"},{"volume-title":"Emerging Threats: Cybersecurity Forecast 2025","year":"2025","author":"Greenberg","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22419-6_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631079"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98225-6_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623986"},{"key":"ref7","article-title":"Human-Machine Teaming in Intelligence Analysis: Requirements for Developing Trust in Machine Learning Systems","author":"Knack","year":"2022","journal-title":"CETaS Research Reports"},{"key":"ref8","first-page":"1","article-title":"Inroads into Autonomous Network Defence using Explained Reinforcement Learning","volume-title":"CAMLIS, ser. CEUR Workshop Proceedings","volume":"3391","author":"Foley","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/IJCS-03-2019-0012"},{"article-title":"Automated cyber defence: A review","year":"2023","author":"Vyas","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110080"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2021.08.061"},{"article-title":"Methodological findings from applying stpa in cyber security case studies","volume-title":"MIT STAMP Conference","author":"Anna","key":"ref13"},{"key":"ref14","article-title":"Application of STPA Methodology to Safety Analysis of Operation Automation System of Nuclear Power Plant Using Artificial Intelligence Technology","author":"Kwon","year":"2020","journal-title":"Transactions of the Korean Nuclear Society Virtual Spring Meeting"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/102792.102799"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2015.11.498"},{"article-title":"STPA handbook","year":"2018","author":"Leveson","key":"ref17"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11228518.pdf?arnumber=11228518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:22:06Z","timestamp":1763191326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11228518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11228518","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}