{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:11:15Z","timestamp":1775146275174,"version":"3.50.1"},"reference-count":17,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/USG.html"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1109\/mc.2020.3038411","type":"journal-article","created":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T02:16:18Z","timestamp":1613182578000},"page":"80-85","source":"Crossref","is-referenced-by-count":59,"title":["To Improve Cyber Resilience, Measure It"],"prefix":"10.1109","volume":"54","author":[{"given":"Alexander","family":"Kott","sequence":"first","affiliation":[{"name":"U.S. DEVCOM Army Research Laboratory, Adelphi, Maryland 20783 United States"}]},{"given":"Igor","family":"Linkov","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, U.S. Army Corps of Engineers, Concord, Massachusetts 01742 United States"}]}],"member":"263","reference":[{"key":"ref10","first-page":"5","article-title":"From &#x2018;weight of evidence&#x2019; analysis to quantitative data integration tools: The path to improve both confidence and utility of hazard assessments","volume":"32","author":"linkov","year":"2015","journal-title":"ALTEX Alternatives Animal Exp"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-04565-4","author":"linkov","year":"2019","journal-title":"The Science and Practice of Resilience Cham"},{"key":"ref12","article-title":"ONR moves to protect ships&#x2019; systems from cyberattacks","author":"pomerleau","year":"2015","journal-title":"Government Computer News"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30100-8"},{"key":"ref14","volume":"2","author":"ross","year":"2018","journal-title":"Systems Security Engineering Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41187-3"},{"key":"ref16","author":"waldman","year":"2020","journal-title":"After a brief pause Trickbot rebounds from takedown efforts"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2993623"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/003591576505800503"},{"key":"ref6","author":"kott","year":"2018","journal-title":"Ground warfare in 2050 How it might look"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2983714"},{"key":"ref8","author":"landi","year":"2020","journal-title":"UHS breach shows the dangers facing hospitals with growing ransomware threats"},{"key":"ref7","author":"kott","year":"2019","journal-title":"Autonomous Intelligent Cyber-Defense Agent (AICA) reference architecture Release 2 0"},{"key":"ref2","year":"2014","journal-title":"Cybersecurity"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.yrtph.2015.04.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9485-y"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9353489\/09353499.pdf?arnumber=9353499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:48:34Z","timestamp":1652194114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9353499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2]]},"references-count":17,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mc.2020.3038411","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2]]}}}