{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T18:13:39Z","timestamp":1773944019091,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,13]]},"DOI":"10.1109\/isse51541.2021.9582528","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T19:39:46Z","timestamp":1635449986000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Model-Based Development of Design Basis Threat for Physical Protection Systems"],"prefix":"10.1109","author":[{"given":"Bedir","family":"Tekinerdogan","sequence":"first","affiliation":[]},{"given":"Kaan","family":"Ozcan","sequence":"additional","affiliation":[]},{"given":"Sevil","family":"Yagiz","sequence":"additional","affiliation":[]},{"given":"Iskender","family":"Yakin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2007","journal-title":"NIST (National Institute of Standards and Technology) &#x2013; Guide to Intrusion Detection and Prevention Systems (IDPS)"},{"key":"ref11","year":"0","journal-title":"SEBOK 2016 Guide to the Systems Engineering Body of Knowledge (SEBoK)"},{"key":"ref12","year":"2015","journal-title":"System Engineering Handbook A Guide For System Life Cycle Process and Activities"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0883-0_1"},{"key":"ref14","article-title":"Systems Engineering Architecture Framework for Physical Protection Systems","author":"tekinerdogan","year":"2020","journal-title":"International Symposium on Systems Engineering (ISSE)"},{"key":"ref15","article-title":"Product Line Architecture Design of Software-Intensive Physical Protection Systems","author":"tekinerdogan","year":"2020","journal-title":"International Symposium on Systems Engineering (ISSE)"},{"key":"ref16","article-title":"Integrated Process Model for Systems Product Line Engineering of Physical Protection Systems","volume":"391","author":"tekinerdogan","year":"2020","journal-title":"Business Modeling and Software Design BMSD 2020 Lecture Notes in Business Information Processing"},{"key":"ref17","article-title":"Feature-Driven Survey of Physical Protection Systems","author":"tekinerdogan","year":"2020","journal-title":"11th Complex Systems Design & Management (CSD&M) conference"},{"key":"ref18","article-title":"Model-Based Systems Product Line Engineering of Physical Protection Systems","author":"tekinerdogan","year":"2021","journal-title":"NCOSE 31st Annual International Symposium 2021"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.infsof.2014.12.007","article-title":"Empirical Evaluation of a Decision Support Model for Adopting Software Product Line Engineering","volume":"60","author":"t\u00fcz\u00fcn","year":"2015","journal-title":"Information and Soft-ware Technology"},{"key":"ref4","author":"garcia","year":"2006","journal-title":"Vulnerability Assessment of Physical Protection Systems"},{"key":"ref3","author":"fennelly","year":"2016","journal-title":"Effective Physical Security"},{"key":"ref6","year":"2016","journal-title":"Guide to the Systems Engineering Body of Knowledge (SEBoK)"},{"key":"ref5","author":"garcia","year":"2008","journal-title":"The Design and Evaluation of Physical Protection Systems"},{"key":"ref8","year":"2000","journal-title":"Handbook on the Physical Protection of Nuclear Material and Facilities IAEA-TECDOC-127"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9386-2"},{"key":"ref2","year":"2009","journal-title":"Development Use and Maintenance of the Design Basis Threat IAEA Nuclear Security Series No 10"},{"key":"ref1","author":"axelsson","year":"2000","journal-title":"Intrusion Detection Systems A Survey and Taxonomy"},{"key":"ref9","year":"2015","journal-title":"INCOSE Systems Engineering Handbook A Guide for System Life Cycle Processes and Activities"},{"key":"ref20","author":"williams","year":"1997","journal-title":"Physical Protection System Design and Evaluation IAEA-CN-68\/29"}],"event":{"name":"2021 IEEE International Symposium on Systems Engineering (ISSE)","location":"Vienna, Austria","start":{"date-parts":[[2021,9,13]]},"end":{"date-parts":[[2021,10,13]]}},"container-title":["2021 IEEE International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9582418\/9582438\/09582528.pdf?arnumber=9582528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:46Z","timestamp":1652201746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9582528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isse51541.2021.9582528","relation":{},"subject":[],"published":{"date-parts":[[2021,9,13]]}}}