{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:18:00Z","timestamp":1730279880712,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/iwcmc48107.2020.9148083","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T21:58:05Z","timestamp":1595887085000},"page":"1435-1439","source":"Crossref","is-referenced-by-count":1,"title":["An Information Security Evaluation Model Supporting Measurement Model Adaptation"],"prefix":"10.1109","author":[{"given":"Jinxin","family":"Zuo","sequence":"first","affiliation":[]},{"given":"Ziyv","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yueming","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"28","article-title":"Comparison of common criteria and information security management system","volume":"6","author":"xie","year":"2018","journal-title":"China Quality and Standards Review"},{"journal-title":"Notice on Issuing Guiding Opinions on Strengthening Industrial Internet Security","year":"2019","key":"ref3"},{"key":"ref6","first-page":"111","article-title":"Research on network security evaluation system oriented to critical information infrastructure","volume":"19","author":"gao","year":"2019","journal-title":"Netinfo Security"},{"key":"ref5","first-page":"493","article-title":"Analyse of the security architecture and policy model in the common criteria","volume":"65","author":"shi","year":"2016","journal-title":"Journal of Tsinghua University"},{"key":"ref8","first-page":"135","article-title":"Security threats and risk assessment of iot system","volume":"40","author":"zhao","year":"2017","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"ref7","first-page":"116","article-title":"Industrial control system security protection capability evaluation service organization ability evaluation index research","volume":"32","author":"he","year":"2019","journal-title":"Industrial Control Compute"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2855752"},{"key":"ref9","first-page":"85","article-title":"Security evaluation method for confidential and stable complex systems","volume":"5","author":"zuo","year":"2019","journal-title":"Chinese Journal of Network and Information Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"}],"event":{"name":"2020 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2020,6,15]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9142627\/9148048\/09148083.pdf?arnumber=9148083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:49Z","timestamp":1656453289000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9148083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iwcmc48107.2020.9148083","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}