{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:46:16Z","timestamp":1725806776317},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8661030","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T23:58:46Z","timestamp":1552003126000},"page":"305-310","source":"Crossref","is-referenced-by-count":2,"title":["Security Metrics: Principles and Security Assessment Methods"],"prefix":"10.1109","author":[{"given":"Abouzar","family":"Arabsorkhi","sequence":"first","affiliation":[]},{"given":"Fariba","family":"Ghaffari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/b17776"},{"journal-title":"NIST 800-55 Performance Measurement Guide for Information Security","year":"2008","key":"ref11"},{"journal-title":"Information Risk Management ISO 27001","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-36584-8","author":"gollmann","year":"2006","journal-title":"Quality of Protection Security Measurements and Metrics"},{"journal-title":"Levels of Management","year":"0","key":"ref14"},{"journal-title":"COBIT 5 A Business Framework for the Governance and Management of Enterprise IT","year":"2012","key":"ref15"},{"journal-title":"Unified Security Metrics","year":"2016","author":"tijink","key":"ref16"},{"journal-title":"Establishing A Security Metrics Program","year":"2010","author":"chris","key":"ref17"},{"journal-title":"On Security Metrics","year":"2015","author":"cheng","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3005714"},{"journal-title":"Information Security Management Metrics","year":"2007","author":"brotby","key":"ref4"},{"journal-title":"PRAGMATIC Security Metrics Applying Metametrics to Information Security","year":"2013","author":"brotby","key":"ref3"},{"journal-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","year":"2007","key":"ref6"},{"journal-title":"IT Security Metrics A Practical Framework for Measuring Security and Protecting Data","year":"2010","author":"hayden","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9781118983836"},{"key":"ref7","article-title":"A Guide to Conducting a Systematic Literature Review of Information System Research","author":"okoli","year":"2010","journal-title":"Sprouts"},{"journal-title":"Security Evaluation","year":"0","key":"ref2"},{"journal-title":"Principles of Information Security","year":"2017","author":"hitman","key":"ref1"},{"journal-title":"Security Metrics Replacing Fear Uncertainty and Doubt","year":"2007","author":"jaquith","key":"ref9"},{"key":"ref20","first-page":"131","author":"tashi","year":"2008","journal-title":"Efficient Security Measurements and Metrics for Risk Assessment"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08661030.pdf?arnumber=8661030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:32:24Z","timestamp":1643257944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8661030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8661030","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}