{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:45:45Z","timestamp":1729651545205,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956566","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T20:35:56Z","timestamp":1498509356000},"page":"402-407","source":"Crossref","is-referenced-by-count":1,"title":["Cyber security risk management for health-based critical infrastructures"],"prefix":"10.1109","author":[{"given":"Myrsini","family":"Athinaiou","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Systems Engineering Guide MITRE Corp","year":"2014","key":"ref33"},{"key":"ref32","first-page":"725","article-title":"Design science in the information systems discipline: an introduction to the special issue on design science research","volume":"34","author":"march","year":"2008","journal-title":"Special Is Design Scince Resear"},{"journal-title":"Strategic Framework and Policy Statement on Improving the Resilience of Critical Infrastructure to Distribution from Natural Hazards Cabinet Office","year":"2010","key":"ref31"},{"key":"ref30","article-title":"Cross-domain security of cyber-physical systems","author":"chhetri","year":"2017","journal-title":"Proc 22nd ASP-DAC Conf"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/JPROC.2011.2161241","article-title":"Cyber-physical modeling of implamentable medical devices","volume":"100","author":"jiang","year":"2012","journal-title":"Proc IEEE"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1629"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1201\/b11352"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2012.6523908"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.04.021"},{"journal-title":"What is a system of systems and why should i care?","year":"0","author":"lane","key":"ref11"},{"key":"ref12","first-page":"40","article-title":"Cyber-physical systems design: formal foundations, methods and integrated tool chains","author":"fitzerald","year":"2015","journal-title":"IEEE\/ACM 3rd FME FormaliSE Florence Italy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2011.07.010"},{"key":"ref14","article-title":"I2SimModeling and simulation framework for scenario development, training, and realtime decision support of multiple interdepedent critical infrastructures during large emergencies","author":"marti","year":"2008","journal-title":"RTA\/MSG Conf"},{"key":"ref15","article-title":"Critical infrastructures: what makes an infrastructure critical?","author":"moteff","year":"2003","journal-title":"Congressional Research Service Report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2155-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2065-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2015.7331365"},{"journal-title":"HM Gov","article-title":"National Cyber Security Strategy 2016&#x2013;2021","year":"2016","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrthm.2009.07.003"},{"key":"ref4","first-page":"20","author":"penzenstadler","year":"2012","journal-title":"A requirements engineering content model for cyber-physical systems"},{"journal-title":"The Scienceof the Artificial","year":"2008","author":"herbert","key":"ref27"},{"key":"ref3","article-title":"Hacking health: security in healthcare IT systems","author":"rubin","year":"2016","journal-title":"presented at the USENIXEnigma"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.02.009"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2004.1265180","article-title":"Modeling and simulating critical infrastructures and theris interdepedencies","author":"rinaldi","year":"2004","journal-title":"37th An Hawaii Internat Conf Syst Scien Hawaii"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1478-4505-12-51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31664-2_2"},{"key":"ref7","article-title":"Report on implementing the federal cybersecurity research and development strategy","author":"jahanian","year":"2014","journal-title":"NITRD\/NCO Arlington Texas Rep"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/actrade\/9780190605384.001.0001"},{"journal-title":"Horizon 2020 Work Programme I Secure societies - Protecting freedom and security of Europe and citizens","article-title":"European Commission Decision, C(2016)4614","year":"2016","key":"ref9"},{"key":"ref1","article-title":"Lessons, issues and challengies in modelling for cyber security","author":"fielder","year":"2017","journal-title":"Comput Research Seminar"},{"journal-title":"(2014) 6 858 ComputerSystems Security","year":"0","author":"zeldovich","key":"ref20"},{"journal-title":"Robust Control System Networks","year":"2012","author":"langer","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2160929"},{"key":"ref24","article-title":"Disrupting nation state hackers","author":"joyce","year":"2016","journal-title":"presented at the USENIX Enigma"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09798-5"},{"key":"ref25","article-title":"Immunising the NHS from cyber attacks","author":"shaw","year":"2016","journal-title":"presented at the UK Health Show"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2017,5,10]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956566.pdf?arnumber=7956566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T03:49:08Z","timestamp":1569556148000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956566","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}