{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:49:49Z","timestamp":1769165389329,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1109\/pst55820.2022.9851965","type":"proceedings-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T18:46:39Z","timestamp":1661453199000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree"],"prefix":"10.1109","author":[{"given":"Xueqin","family":"Gao","sequence":"first","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Tao","family":"Shang","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Da","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]}],"member":"263","reference":[{"issue":"24","key":"ref1","first-page":"21","article-title":"Attack trees: modeling security threats","volume":"12","author":"Scheier","year":"1999","journal-title":"Dr Dobb\u2019s Journal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2542859"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1765","DOI":"10.1016\/j.phpro.2012.02.260","article-title":"An Network Attack Modeling Method Based on MLL-AT","volume":"24","author":"Yan","year":"2012","journal-title":"Physics Procedia"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/info10080251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s20164404"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.211"},{"issue":"8","key":"ref9","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1002\/sec.299","article-title":"Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees","volume":"5","author":"Arpan","year":"2012","journal-title":"Sec. and Commun. Netw"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1153-7_644"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.fss.2018.08.009","article-title":"Fuzzy Analytic Hierarchy Process: A performance analysis of various algorithms","volume":"362","author":"Faran","year":"2019","journal-title":"Fuzzy Sets and Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.nima.2016.06.126"},{"key":"ref13","article-title":"Information security: technologies to secure federal systems","year":"2004"}],"event":{"name":"2022 19th Annual International Conference on Privacy, Security & Trust (PST)","location":"Fredericton, NB, Canada","start":{"date-parts":[[2022,8,22]]},"end":{"date-parts":[[2022,8,24]]}},"container-title":["2022 19th Annual International Conference on Privacy, Security &amp; Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9851848\/9851959\/09851965.pdf?arnumber=9851965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T02:45:54Z","timestamp":1706064354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9851965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/pst55820.2022.9851965","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]}}}