{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:28:57Z","timestamp":1768030137928,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/uemcon47517.2019.8993105","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T08:36:46Z","timestamp":1581669406000},"page":"1015-1021","source":"Crossref","is-referenced-by-count":8,"title":["SecML: A Proposed Modeling Language for CyberSecurity"],"prefix":"10.1109","author":[{"given":"Chuck","family":"Easttom","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29749-6_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.1077"},{"key":"ref13","article-title":"Analyzing mission impacts of cyber actions (AMICA)","author":"noel","year":"2015","journal-title":"NATO IST-128 Workshop on Cyber Attack Detection Forensics and Attribution for Assessment of Mission Impact Istanbul Turkey"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/bs.host.2016.07.001","article-title":"CyGraph: graph-based analytics and visualization for cybersecurity","volume":"35","author":"noel","year":"2016","journal-title":"Handbook of Statistics"},{"key":"ref15","article-title":"A Systems Approach to Indicators of Compromise Utilizing Graph Theory","author":"easttom","year":"0","journal-title":"IEEE International Symposium on Technologies for Homeland Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1500446"},{"key":"ref17","author":"dennis","year":"2015","journal-title":"Systems analysis and design An object-oriented approach with UML"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301644"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.jare.2013.12.005","article-title":"Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment","volume":"5","author":"aditya","year":"2014","journal-title":"Journal of Advanced Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/9781315273860"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95669-5"},{"key":"ref6","author":"rainey","year":"2015","journal-title":"Modeling and Simulation Support for System of Systems Engineering Applications"},{"key":"ref5","author":"buede","year":"2016","journal-title":"The Engineering Design of Systems Models and Methods"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382574"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2015.37"},{"key":"ref2","first-page":"1","author":"reinhartz-berger","year":"2017","journal-title":"Guest editorial for EMMSAD'2017 special section Software & Systems Modeling"},{"key":"ref1","author":"friedenthal","year":"2014","journal-title":"A Practical Guide to SysML The Systems Modeling Language"},{"key":"ref9","author":"easttom","year":"2019","journal-title":"Computer Security Fundamentals 4th Edition"},{"key":"ref20","first-page":"1","article-title":"Data security and threat modeling for smart city infrastructure","author":"paul","year":"0","journal-title":"2015 International Conference on Cyber Security of Smart Cities Industrial Control System and Communications (SSIC)"},{"key":"ref22","author":"easttom","year":"2018","journal-title":"Penetration Testing Fundamentals A Hands-on Guide to Reliable Security Audits"},{"key":"ref21","first-page":"1","article-title":"A SysML extension for security analysis of industrial control systems","author":"lemaire","year":"0","journal-title":"2nd International Symposium for ICS &amp SCADA Cyber Security Research 2014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3627-7_10"},{"key":"ref23","author":"young","year":"2017","journal-title":"The Development of an Applied Ethical Hacking and Security Assessment Course"}],"event":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","location":"New York City, NY, USA","start":{"date-parts":[[2019,10,10]]},"end":{"date-parts":[[2019,10,12]]}},"container-title":["2019 IEEE 10th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966519\/8992916\/08993105.pdf?arnumber=8993105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:26:08Z","timestamp":1658262368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8993105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/uemcon47517.2019.8993105","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}