{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T04:24:04Z","timestamp":1730262244557,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1109\/iecon49645.2022.9968328","type":"proceedings-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T13:45:34Z","timestamp":1670593534000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Attack Tree Refinements Analysis and Verification by applying Coloured Petri Nets"],"prefix":"10.1109","author":[{"given":"Shabnam","family":"Pasandideh","sequence":"first","affiliation":[{"name":"NOVA School of Science and Technology - NOVA University Lisbon,Center of Technology and Systems-UNINOVA,Dept. Electrical and Computer Engineering,Caparica,Portugal"}]},{"given":"Pedro","family":"Pereira","sequence":"additional","affiliation":[{"name":"NOVA School of Science and Technology - NOVA University Lisbon,Center of Technology and Systems-UNINOVA,Dept. Electrical and Computer Engineering,Caparica,Portugal"}]},{"given":"Luis","family":"Gomes","sequence":"additional","affiliation":[{"name":"NOVA School of Science and Technology - NOVA University Lisbon,Center of Technology and Systems-UNINOVA,Dept. Electrical and Computer Engineering,Caparica,Portugal"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2003.1231405"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/VECOS2010.8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69462-7_32"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(03)00116-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17197-0_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852698"},{"key":"ref19","first-page":"167","article-title":"DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype","author":"snapp","year":"1991","journal-title":"Proceedings of the 14th National Computer Security Conference"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.22215\/timreview\/835","article-title":"Defining Cybersecurity","volume":"4","author":"craigen","year":"2014","journal-title":"Technology Innovation Management Review"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICoCS.2012.6458588"},{"key":"ref6","first-page":"219","article-title":"A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees","author":"edge","year":"2007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039705"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45237-0_60"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.46"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170813"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/b95112"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2009.5340029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270307"}],"event":{"name":"IECON 2022 \u2013 48th Annual Conference of the IEEE Industrial Electronics Society","start":{"date-parts":[[2022,10,17]]},"location":"Brussels, Belgium","end":{"date-parts":[[2022,10,20]]}},"container-title":["IECON 2022 \u2013 48th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9968313\/9968303\/09968328.pdf?arnumber=9968328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T14:38:01Z","timestamp":1672065481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9968328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iecon49645.2022.9968328","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]}}}