{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:15Z","timestamp":1740141315942,"version":"3.37.3"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/msec.2023.3336028","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:50:30Z","timestamp":1705949430000},"page":"69-72","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Security Through Isolation and Defense in Depth"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-3647","authenticated-orcid":false,"given":"Eric","family":"Bodden","sequence":"first","affiliation":[{"name":"Secure Software Engineering Group, Heinz Nixdorf Institute, Paderborn University, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8778-2989","authenticated-orcid":false,"given":"Jens","family":"Pottebaum","sequence":"additional","affiliation":[{"name":"Product Creation, Heinz Nixdorf Institute at Paderborn University, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1269-0702","authenticated-orcid":false,"given":"Markus","family":"Fockel","sequence":"additional","affiliation":[{"name":"Safe &amp; Secure IoT Systems Department, Fraunhofer IEM, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5765-971X","authenticated-orcid":false,"given":"Iris","family":"Gr\u00e4\u00dfler","sequence":"additional","affiliation":[{"name":"Product Creation, Heinz Nixdorf Institute at Paderborn University, Paderborn, Germany"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1566445.1566509"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.infsof.2018.05.011"},{"volume-title":"Military Construction Pricing GUIDE","year":"1967","key":"ref3"},{"volume-title":"Unified Systems Safety Analysis for Nuclear Power Plants","year":"1968","author":"Garrick","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TSE.2010.60"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1842752.1842787"},{"key":"ref7","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","volume-title":"Proc. 8th IEEE Int. Symp. Fault-Tolerant Comput. (FTCS)","volume":"1","author":"Chen","year":"1978"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MSP.2013.129"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/NCA.2019.8935046"},{"volume-title":"Chaos Engineering: System Resiliency in Practice","year":"2020","author":"Rosenthal","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MSEC.2022.3202625"},{"volume-title":"Consolidated text: Directive 2006\/42\/EC of the European Parliament and of the Council of 17 May 2006 on machinery, and amending Directive 95\/16\/EC (recast) (Text with EEA relevance) Text with EEA relevance","year":"2023","key":"ref12"},{"key":"ref13","article-title":"The evolution of system safety at NASA","volume-title":"Proc. 32nd Int. Syst. Saf. Training Symp.","author":"Dezfuli","year":"2014"},{"key":"ref14","first-page":"699","article-title":"Retrofitting fine grain isolation in the Firefox renderer","volume-title":"Proc. 29th USENIX Conf. Secur. Symp.","author":"Narayan","year":"2020"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/10411714\/10411721.pdf?arnumber=10411721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:11:51Z","timestamp":1706753511000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10411721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":14,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/msec.2023.3336028","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}