{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:55:45Z","timestamp":1761897345612},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/sose50414.2020.9130491","type":"proceedings-article","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:49:38Z","timestamp":1593625778000},"page":"83-86","source":"Crossref","is-referenced-by-count":9,"title":["Identifying Security Issues with MBSE while Rebuilding Legacy Software Systems"],"prefix":"10.1109","author":[{"given":"Donatas","family":"Mazeika","sequence":"first","affiliation":[]},{"given":"Rimantas","family":"Butleris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Legacy System Modernization How to Transform the Enterprise for Digital Future","year":"2017","key":"ref10"},{"journal-title":"5 Key Strategies for Application Modernization","year":"2019","key":"ref11"},{"journal-title":"Model-Based SystemsEngineering","year":"2018","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.01.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0269-8"},{"journal-title":"About The Unified Architecture Framework Specification Version 1 1 Beta","year":"2020","key":"ref17"},{"journal-title":"Information Technology - Security Techniques - Information Security Management Systems - Requirements","year":"0","key":"ref18"},{"journal-title":"About the Semantics of a Foundational Subset for Executable UML Models Specification Version 1 1 Beta","year":"2020","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/j.2334-5837.2017.00350.x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2016.7542911"},{"key":"ref6","article-title":"Towards Transforming Legacy Products to their Model-Based Representations","author":"maheshwari","year":"2018","journal-title":"International Council on Systems Engineering Great Lakes Regional Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2010.483929"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5137625"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.05.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21438"},{"journal-title":"Systems Engineering Handbook","year":"2007","key":"ref1"},{"journal-title":"Monolith to Microservices Using the Strangler Pattern","year":"2018","author":"behara","key":"ref9"},{"journal-title":"Addressing airport cyber-security Final report","year":"2016","key":"ref20"}],"event":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","start":{"date-parts":[[2020,6,2]]},"location":"Budapest, Hungary","end":{"date-parts":[[2020,6,4]]}},"container-title":["2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9127410\/9130461\/09130491.pdf?arnumber=9130491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T11:18:39Z","timestamp":1656587919000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9130491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/sose50414.2020.9130491","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}