{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:52Z","timestamp":1750308712327,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1145\/2422498.2422500","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T12:58:22Z","timestamp":1357217902000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Architecting a security strategy measurement and management system"],"prefix":"10.1145","author":[{"given":"Roland","family":"Rieke","sequence":"first","affiliation":[{"name":"Fraunhofer Institute SIT, Darmstadt, Germany"}]},{"given":"Julian","family":"Sch\u00fctte","sequence":"additional","affiliation":[{"name":"Fraunhofer Institution AISEC, Garching, Germany"}]},{"given":"Andrew","family":"Hutchison","sequence":"additional","affiliation":[{"name":"T-Systems South Africa, Bellville, Cape Town, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2012,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Araknos website. http:\/\/www.araknos.it\/en.html 2012. {Online; accessed 16-Sep-2012}.  Araknos website. http:\/\/www.araknos.it\/en.html 2012. {Online; accessed 16-Sep-2012}."},{"key":"e_1_3_2_1_2_1","unstructured":"Esper -- Complex Event Processing. http:\/\/esper.codehaus.org\/ 2012. {Online; accessed 16-Sep-2012}.  Esper -- Complex Event Processing. http:\/\/esper.codehaus.org\/ 2012. {Online; accessed 16-Sep-2012}."},{"key":"e_1_3_2_1_3_1","unstructured":"Project MASSIF website. http:\/\/www.massif-project.eu\/ 2012. {Online; accessed 16-Sep-2012}.  Project MASSIF website. http:\/\/www.massif-project.eu\/ 2012. {Online; accessed 16-Sep-2012}."},{"key":"e_1_3_2_1_4_1","unstructured":"AlienValult. AlienVault Unified SIEM. http:\/\/alienvault.com\/ 2012. {Online; accessed 16-Sep-2012}.  AlienValult. AlienVault Unified SIEM. http:\/\/alienvault.com\/ 2012. {Online; accessed 16-Sep-2012}."},{"key":"e_1_3_2_1_5_1","first-page":"76","volume-title":"Proceedings of the The Fourth International Conference on Information, Process, and Knowledge Management (eKNOW 2011","author":"Baumg\u00e4rtner L.","year":"2012"},{"key":"e_1_3_2_1_6_1","first-page":"0","author":"Buecker A.","year":"2010","journal-title":"IBM Redbooks"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"H. Debar D. Curry and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental) March 2007.  H. Debar D. Curry and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental) March 2007.","DOI":"10.17487\/rfc4765"},{"volume-title":"Center for Advanced Engineering Study","year":"1993","author":"Deming W. E.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","series-title":"CEUR Workshop Proceedings","first-page":"25","volume-title":"Proceedings of the 6th International Workshop on Models@run.time at the ACM\/IEEE 14th International Conference on Model Driven Engineering Languages and Systems (MODELS","author":"Eichler J.","year":"2011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774478"},{"volume-title":"ISOIEC","year":"2009","author":"Iec I.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"ISSA","author":"Innerhofer-Oberperfler F.","year":"2006"},{"key":"e_1_3_2_1_13_1","first-page":"391","volume-title":"SECRYPT","author":"Kotenko I.","year":"2012"},{"key":"e_1_3_2_1_14_1","unstructured":"Lieberman Software. Common event format configuration guide Jan. 2010.  Lieberman Software. Common event format configuration guide Jan. 2010."},{"volume-title":"Swedish Defence Research Agency","year":"2011","author":"Lundholm K.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","first-page":"108","volume-title":"Workshop Models@run.time","author":"Melik-Merkumians M.","year":"2010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"PreludeIDS Technologies. Prelude PRO 1.0. http:\/\/www.prelude-technologies.com\/ 2010.  PreludeIDS Technologies. Prelude PRO 1.0. http:\/\/www.prelude-technologies.com\/ 2010.","DOI":"10.1215\/9780822393511-001"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes of the Institute for Computer Sciences","first-page":"139","volume-title":"C. K. Georgiadis et al.","author":"Prieto E.","year":"2012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13241-4_11"},{"volume-title":"MASSIF Project","year":"2011","author":"Repp J.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","series-title":"ACM International Conference Proceeding Series","first-page":"198","volume-title":"H.-A","author":"Schiefer J.","year":"2007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.141"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"F.\n       \n      Skopik Z.\n       \n      Ma P.\n       \n      Smith and \n      \n      \n      T.\n       \n      Bleier\n      \n  \n  . \n  Designing a cyber attack information system for national situational awareness. In N. Aschenbruck P. Martini M. Meier and J. T\u00f6lle editors Future Security volume \n  318\n   of \n  Communications in Computer and Information Science pages \n  277\n  --\n  288\n  . \n  Springer 2012\n  .  F. Skopik Z. Ma P. Smith and T. Bleier. Designing a cyber attack information system for national situational awareness. In N. Aschenbruck P. Martini M. Meier and J. T\u00f6lle editors Future Security volume 318 of Communications in Computer and Information Science pages 277--288. Springer 2012.","DOI":"10.1007\/978-3-642-33161-9_42"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2007.012248"}],"event":{"name":"MODELS '12: ACM\/IEEE 15th International Conference on Model Driven Engineering Languages and Systems","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Innsbruck Austria","acronym":"MODELS '12"},"container-title":["Proceedings of the Workshop on Model-Driven Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422498.2422500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2422498.2422500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:15Z","timestamp":1750277655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422498.2422500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":25,"alternative-id":["10.1145\/2422498.2422500","10.1145\/2422498"],"URL":"https:\/\/doi.org\/10.1145\/2422498.2422500","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]},"assertion":[{"value":"2012-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}