{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:46:43Z","timestamp":1768283203684,"version":"3.49.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447130","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Evaluating the Use of Technology Readiness Levels (TRLs) for Cybersecurity Systems"],"prefix":"10.1109","author":[{"given":"Jeremy","family":"Straub","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/10576100490483660"},{"key":"ref38","author":"carin","year":"2007","journal-title":"Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity The QuERIES Methodology"},{"key":"ref33","article-title":"Cyber attacks cost U.S. enterprises $1.3 million on average in 2017| CSO Online","author":"smith","year":"2017","journal-title":"Privacy and Security Fanatic"},{"key":"ref32","article-title":"Microsoft report shows increasing sophistication of cyber threats","author":"burt","year":"2020","journal-title":"Microsoft on the Issues"},{"key":"ref31","article-title":"Ransomware 2020: Attack Trends Affecting Organizations Worldwide","author":"singleton","year":"2020","journal-title":"Security Intelligence"},{"key":"ref30","article-title":"Five cybersecurity trends from 2020 &#x2013; And what the future holds","author":"bonnay","year":"2020","journal-title":"Security Magazine"},{"key":"ref37","author":"gordon","year":"2018","journal-title":"Managing Cybersecurity Resources A Cost-Benefit Analysis"},{"key":"ref36","article-title":"Data Breaches Expose 4.1 Billion Records In First Six Months Of 2019","author":"winder","year":"2019","journal-title":"Forbes"},{"key":"ref35","article-title":"Cyber Security Statistics for 2019| Cyber Defense Magazine","year":"2019","journal-title":"Cyber Defense Magazine"},{"key":"ref34","article-title":"Top 5 cybersecurity facts, figures and statistics for 2018| CSO Online","author":"morgan","year":"2018","journal-title":"Cybersecurity Business Report"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2019.8741935"},{"key":"ref40","author":"drucker","year":"2006","journal-title":"The Practice of Management Paperback Reissue"},{"key":"ref11","first-page":"1","author":"kirschenbaum","year":"2020","journal-title":"Building Blocks for the Future TRL 10 and 11 Commercial Spacecraft Avionics"},{"key":"ref12","article-title":"U.S. Department of Energy Technology Readiness Assessment Guide","year":"2009","journal-title":"U S Department of Energy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21236\/ADA530242"},{"key":"ref14","article-title":"Department of Homeland Security and Technology Readiness Level Calculator","author":"mcgarvey","year":"2009","journal-title":"Homeland Security Studies and Analysis Institute"},{"key":"ref15","article-title":"Technology Readiness Levels Handbook for Space Applications","year":"2008","journal-title":"European Space Agency"},{"key":"ref16","author":"kenley","year":"2012","journal-title":"An Analysis of TRL-Based Cost and Schedule Models"},{"key":"ref17","article-title":"Defense Acquisition Guidebook","year":"2011","journal-title":"Department of Defense"},{"key":"ref18","article-title":"Annex G. Technology readiness levels (TRL)","year":"2013","journal-title":"Horizon 2020 - Work Programme 2014-2015 European Commission"},{"key":"ref19","article-title":"From NASA to EU: the evolution of the TRL scale in Public Sector Innovation","volume":"22","author":"h\u00e9der","year":"2017","journal-title":"Innovation Journal The Public Sector Innovation Journal"},{"key":"ref28","article-title":"NASA Risk-Informed Decision Making Handbook","year":"2010","journal-title":"National Aeronautics and Space Administration"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0094-5765(89)90054-4"},{"key":"ref27","article-title":"NASA Systems Engineering Handbook","year":"2007","journal-title":"National Aeronautics and Space Administration"},{"key":"ref3","article-title":"Technology Readiness Levels Demystified","author":"banke","year":"2010","journal-title":"NASA Website"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2009.03.059"},{"key":"ref29","year":"0","journal-title":"The Instrument Incubator Program (IIP)"},{"key":"ref5","article-title":"Technology readiness levels","volume":"6","author":"mankins","year":"1995","journal-title":"White Pap"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-5347"},{"key":"ref7","author":"brown","year":"2000","journal-title":"National Spaceport Testbed"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2009.03.058"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2015.07.007"},{"key":"ref1","article-title":"NASA Systems Engineering Processes and Requirements","year":"2013","journal-title":"National Aeronautics and Space Administration"},{"key":"ref20","author":"krenn","year":"2020","journal-title":"D3 2 Cross Sectoral Cybersecurity Building Blocks Dissemination Level PU Lead Participant AIT Lead Author Contributing Beneficiaries"},{"key":"ref22","article-title":"CMMC explained: What defense contractors need to know","author":"stokes","year":"2020","journal-title":"CSO Online"},{"key":"ref21","year":"2020","journal-title":"Cybersecurity Maturity Model Certification (CMMC) Version 1 02"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/837"},{"key":"ref23","article-title":"Current Cybersecurity Maturity Models: How Effective in Healthcare Cloud?","author":"akinsanya","year":"2019","journal-title":"CERC"},{"key":"ref26","article-title":"NASA System Safety Handbook","year":"2011","journal-title":"National Aeronautics and Space Administration"},{"key":"ref25","article-title":"NASA Strategic Space Technology Investment Plan","year":"2012","journal-title":"National Aeronautics and Space Administration"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447130.pdf?arnumber=9447130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:06Z","timestamp":1652197326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447130","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}