{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:04:04Z","timestamp":1730286244972,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266480","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"],"prefix":"10.1109","author":[{"given":"Gustavo Gonzalez","family":"Granadillo","sequence":"first","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]},{"given":"Herve","family":"Debar","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Ponchel","sequence":"additional","affiliation":[]},{"given":"Laura Rodriguez","family":"Martin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Return on Information Security Investments: Myths vs. Realities","volume":"84","author":"gordon","year":"2002","journal-title":"Strategic Finance"},{"key":"ref11","article-title":"Response policies and countermeasures: Management of service dependencies and intrusion and reaction impacts PhD Thesis","author":"kheir","year":"2010","journal-title":"Ecole Nationale Sup&#x00E9;rieure des Telecommunications de Bretagne"},{"key":"ref12","first-page":"63","volume":"13","author":"gonzalez granadillo","year":"2014","journal-title":"RORI-based countermeasure selection using the OrBAC formalism"},{"journal-title":"Safety Integrity Level Manual PEPPERL+FUCHS","year":"2007","author":"ingrey","key":"ref13"},{"journal-title":"Guide for Conducting Risk Assessment","year":"2012","key":"ref14"},{"journal-title":"InformationTechnology - Security Techniques - Information Security Risk Management","year":"2008","key":"ref15"},{"journal-title":"MEHARI 2010 - Risk Analysis and Treatment Guide","year":"2010","key":"ref16"},{"journal-title":"ANSSI EBIOS 2010 - Expression of Needs and Identification of Security Objectives","year":"2010","key":"ref17"},{"article-title":"Quantified Return On Information Security Investment - A Model for Cost-Benefit Analysis","year":"2009","author":"puangsri","key":"ref4"},{"key":"ref3","first-page":"626","article-title":"A Service Dependency Model for Cost-Sensitive Intrusion Response","author":"kheir","year":"2010","journal-title":"European symposium on research in computer security"},{"journal-title":"Return on Investment (ROI) Meaning and Use Encyclopedia of Business Terms and Methods","year":"2011","author":"schmidt","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/047148296X.tie154"},{"key":"ref8","article-title":"Return On Security Investment (ROSI) A Practical Quantitative Model","volume":"38","author":"sonnenreich","year":"2006","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"ref7","article-title":"Evaluating Information Security Investment from Attackers Perspective: the Return-On-Attack (ROA)","author":"cremonini","year":"2005","journal-title":"4th Workshop on the Economics on Information Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.16"},{"journal-title":"mid-size and enterprise organizations White Paper","article-title":"Threat analysis and defense strategies for SMB","year":"2011","key":"ref1"},{"key":"ref9","article-title":"Methodologies for Evaluating Information Security Investments - What Basel II Can Change in the Financial Industry","author":"locher","year":"2005","journal-title":"ECIS Proceedings"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266480.pdf?arnumber=7266480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:38:42Z","timestamp":1490391522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266480","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}