{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:47:16Z","timestamp":1767084436581,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ERC","award":["227977 (SMScom)","291652 (ASAP)"],"award-info":[{"award-number":["227977 (SMScom)","291652 (ASAP)"]}]},{"name":"SFI","award":["10\/CE\/I1855","13\/RC\/2094"],"award-info":[{"award-number":["10\/CE\/I1855","13\/RC\/2094"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,5,1]]},"DOI":"10.1109\/tdsc.2016.2599880","type":"journal-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T19:43:46Z","timestamp":1471031026000},"page":"466-480","source":"Crossref","is-referenced-by-count":44,"title":["On the Interplay Between Cyber and Physical Spaces for Adaptive Security"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9493-3404","authenticated-orcid":false,"given":"Christos","family":"Tsigkanos","sequence":"first","affiliation":[]},{"given":"Liliana","family":"Pasquale","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Ghezzi","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.08.002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.10.006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03741-2_28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.04.013"},{"key":"ref30","first-page":"85","article-title":"The BPL tool: A tool for experimenting with bigraphical reactive systems","author":"h\u00f8jsgaard","year":"2011","journal-title":"Bigraphical Languages and their Simulation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/32.629493"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.09.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.08.004"},{"key":"ref27","first-page":"2","article-title":"BiAgents&#x2014;A bigraphical agent model for structure-aware computation","author":"pereira","year":"2012","journal-title":"Cyber-Physical Cloud Comput Working Papers CPCC Berkeley"},{"article-title":"A SAT based\n algorithm for the matching problem in bigraphs with sharing","year":"2010","author":"sevegnani","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605959"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-013-0210-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1995.523273"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.234"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2897035.2897042"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33024-7_17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"journal-title":"Security in Computing","year":"2003","author":"pfleeger","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16074-5_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"journal-title":"Building AutomationCommunication Systems with EIB\/KNX LON and BACnet","year":"2009","author":"merz","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2036033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"journal-title":"Communicating and mobile systems The pi calculus","year":"1999","author":"milner","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2882784"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.02.011"},{"journal-title":"Information Technology&#x2014;Security Techniques&#x2014;(27001) Information Security Management Systems (27005) Information Security Risk Management","year":"2008","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-007-0013-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.08.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912262"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0046-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626661"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345794"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487225"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2093973.2094018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/32.685256"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2555611"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.012"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8356073\/07542583.pdf?arnumber=7542583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:55Z","timestamp":1642004755000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7542583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,1]]},"references-count":49,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2599880","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2018,5,1]]}}}