{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T18:01:44Z","timestamp":1760551304279,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1109\/isse49799.2020.9272239","type":"proceedings-article","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T02:37:42Z","timestamp":1607135862000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Product Line Architecture Design of Software-Intensive Physical Protection Systems"],"prefix":"10.1109","author":[{"given":"Bedir","family":"Tekinerdogan","sequence":"first","affiliation":[]},{"given":"Iskender","family":"Yakin","sequence":"additional","affiliation":[]},{"given":"Sevil","family":"Yagiz","sequence":"additional","affiliation":[]},{"given":"Kaan","family":"Ozcan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IAEA-TECDOC-127","article-title":"Handbook on the Physical Protection of Nuclear Material and Facilities","year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"journal-title":"Designing the Internet of Things","year":"2014","author":"mcewen","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.1020282"},{"journal-title":"Guide to intrusion detection and prevention systems (IDPS)","year":"2007","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.1020287"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94370-1_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/ijkss.2014100101"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE46696.2019.8984574"},{"journal-title":"Documenting Software Architectures Views and Beyond","year":"2010","author":"clements","key":"ref4"},{"journal-title":"Software Product Lines Practices and Patterns","year":"2002","author":"clements","key":"ref3"},{"journal-title":"Effective Physical Security Fifth Edition","year":"2016","author":"fennelly","key":"ref6"},{"key":"ref5","first-page":"336","article-title":"Software language engineering of architectural viewpoints","author":"demirli","year":"0","journal-title":"Proceedings of the 2nd European Conference on Software Architecture"},{"journal-title":"The Design and Evaluation of Physical Protection Systems","year":"2008","author":"garcia","key":"ref8"},{"journal-title":"Vulnerability Assessment of Physical Protection Systems","year":"2006","author":"garcia","key":"ref7"},{"key":"ref2","article-title":"Characterization of early aspects approaches","author":"bakker","year":"2005","journal-title":"International workshop on Early Aspects at AOSD"},{"journal-title":"Guide to the Systems Engineering Body of Knowledge (SEBoK)","year":"2016","key":"ref9"},{"journal-title":"Intrusion Detection Systems A Survey and Taxonomy","year":"2000","author":"axelsson","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE46696.2019.8984459"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.15344\/2456-4451\/2017\/117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11538097_11"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-52306-0_9","article-title":"Integrated Process Model for Systems Product Line Engineering of Physical Protection Systems","author":"tekinerdogan","year":"2020","journal-title":"Proc Int Symp Bus Modeling Softw Design"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.infsof.2014.12.007","article-title":"Empirical Evaluation of a Decision Support Model for Adopting Software Product Line Engineering","volume":"60","author":"t\u00fcz\u00fcn","year":"2015","journal-title":"Information and Software Technology Elsevier"},{"key":"ref26","article-title":"Physical Protection System Design and Evaluation","author":"williams","year":"1997","journal-title":"IAEA-CN-68\/29"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2019.8753841"}],"event":{"name":"2020 IEEE International Symposium on Systems Engineering (ISSE)","start":{"date-parts":[[2020,10,12]]},"location":"Vienna, Austria","end":{"date-parts":[[2020,11,12]]}},"container-title":["2020 IEEE International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9272011\/9272012\/09272239.pdf?arnumber=9272239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:21Z","timestamp":1656453321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9272239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isse49799.2020.9272239","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]}}}