{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:18:15Z","timestamp":1725495495200},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423610","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"208-211","source":"Crossref","is-referenced-by-count":2,"title":["Decision centric identification and rank ordering of security metrics"],"prefix":"10.1109","author":[{"given":"Moazzam","family":"Khan","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Omer","sequence":"additional","affiliation":[]},{"given":"John","family":"Copeland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NetCoM.2009.83"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.138"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.260"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","article-title":"What is more secure, open or closed source?","author":"khan","year":"2012","journal-title":"An Investigation from Vulnerability and Exploit's Perspective"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.88"},{"year":"0","key":"9"},{"journal-title":"Security Metrics Replacing Fear","year":"0","author":"jacquit","key":"8"},{"year":"0","key":"11"},{"year":"0","key":"12"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423610.pdf?arnumber=6423610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:13:45Z","timestamp":1490127225000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423610","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}