{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:01:13Z","timestamp":1764784873938,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,3,1]]},"DOI":"10.1109\/tse.2022.3168672","type":"journal-article","created":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T19:35:39Z","timestamp":1650396939000},"page":"962-972","source":"Crossref","is-referenced-by-count":5,"title":["Program Synthesis for Cyber-Resilience"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5015-5893","authenticated-orcid":false,"given":"Nestor","family":"Catano","sequence":"first","affiliation":[{"name":"Department of Computing and Information Systems, Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"263","reference":[{"year":"2021","key":"ref1","article-title":"Broken access control"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139195881"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-010-0145-y"},{"issue":"1\/2","key":"ref4","first-page":"1","article-title":"Refinement, decomposition and instantiation of discrete models: Application to Event-B","volume":"77","author":"Abrial","year":"2007","journal-title":"Fundamentae Informatica"},{"key":"ref5","first-page":"23","article-title":"Constructing a science of cyber-resilience for military systems","volume-title":"Proc. NATO IST-153 Workshop Cyber Resilience","author":"Alexeev"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2015.06.002"},{"volume-title":"Software Architecture in Practice","year":"2012","author":"Bass","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.284"},{"article-title":"Cyber resiliency design principles","year":"2017","author":"Bodeau","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2016.15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40648-0_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231978"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511663079"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-3658-0_10"},{"volume-title":"Software Abstractions: Logic, Language, and Analysis","year":"2006","author":"Jackson","key":"ref15"},{"article-title":"Approaches to enhancing cyber resilience: Report of the north atlantic treaty organization (NATO) workshop IST-153","year":"2018","author":"Kott","key":"ref16"},{"key":"ref17","first-page":"353","article-title":"Resilient computer systems development for cyberattacks resistance","volume-title":"Proc. 2nd Int. Workshop Intell. Inf. Technol. Syst. Inf. Secur. CEUR-WS","author":"Lysenko"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640070"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0381-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00033"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392222"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10181-1_14"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45719-4_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSR51244.2020.00011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2019.00-26"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10070338\/09760016.pdf?arnumber=9760016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:15:34Z","timestamp":1705958134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9760016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":27,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3168672","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2023,3,1]]}}}