{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:13:48Z","timestamp":1773926028775,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/sysose.2012.6384127","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:49:45Z","timestamp":1359568185000},"page":"285-290","source":"Crossref","is-referenced-by-count":10,"title":["Advancing the defense in depth model"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Groat","sequence":"first","affiliation":[]},{"given":"Joseph","family":"Tront","sequence":"additional","affiliation":[]},{"given":"Randy","family":"Marchany","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4614"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2005.1635498"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818807"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2003.1266234"},{"key":"3","author":"shactman","year":"2011","journal-title":"Exclusive Computer Virus Hits U s Drone Fleet"},{"key":"2","year":"2012","journal-title":"2012 Global Security Report"},{"key":"1","year":"0","journal-title":"Defense in Depth A Practical Strategy for Achieving Information Assurance in Todays Highly Networked Environments"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194977"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264860"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"5","first-page":"64","article-title":"Defense-in-depth revisited: Qualitative risk analysis methodology for complex network-centric operations","volume":"1","author":"bass","year":"2001","journal-title":"Military Communications Conference 2001 MILCOM 2001 Communications for Network-Centric Operations Creating the Information Force IEEE"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194877"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935052"}],"event":{"name":"2012 7th International Conference on System of Systems Engineering (SoSE)","location":"Genova","start":{"date-parts":[[2012,7,16]]},"end":{"date-parts":[[2012,7,19]]}},"container-title":["2012 7th International Conference on System of Systems Engineering (SoSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6324004\/6355890\/06384127.pdf?arnumber=6384127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:02:34Z","timestamp":1490126554000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6384127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/sysose.2012.6384127","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}