{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:01Z","timestamp":1750306381934,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T00:00:00Z","timestamp":1468972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,20]]},"DOI":"10.1145\/2947626.2947630","type":"proceedings-article","created":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T12:11:05Z","timestamp":1468325465000},"page":"141-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Scalable Threats Classification Model in Information Systems"],"prefix":"10.1145","author":[{"given":"Mouna","family":"Jouini","sequence":"first","affiliation":[{"name":"Laboratoire SOIE, Institut Sup\u00e9rieur de Gestion, Tunis, Tunisie"}]},{"given":"Latifa","family":"Ben Arfa Rabai","sequence":"additional","affiliation":[{"name":"Laboratoire SOIE, Institut Sup\u00e9rieur de Gestion, Tunis, Tunisie"}]}],"member":"320","published-online":{"date-parts":[[2016,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The 5th International Conference on Cyber Conflict. IEEE Xplore Digital Library.","author":"Applegate DS","year":"2013","unstructured":"Applegate DS , Stavrou A , 2013 . Towards a cyber conflict taxonomy . The 5th International Conference on Cyber Conflict. IEEE Xplore Digital Library. Applegate DS, Stavrou A, 2013. Towards a cyber conflict taxonomy. The 5th International Conference on Cyber Conflict. IEEE Xplore Digital Library."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.ijepes.2013.02.008"},{"volume-title":"Threat Modeling","author":"Swiderski F.","unstructured":"Swiderski , F. , Snyder , W. 2004. Threat Modeling . Microsoft Press Swiderski, F., Snyder, W. 2004. Threat Modeling. Microsoft Press","key":"e_1_3_2_1_3_1"},{"unstructured":"PwC. 2015. Managing cyber risks in an interconnected world: Key finding The Global State of Information Security\u00ae Survey.  PwC. 2015. Managing cyber risks in an interconnected world: Key finding The Global State of Information Security\u00ae Survey.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.procs.2015.05.024"},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"265","article-title":"Towards quantitative measures of Information Security: A Cloud Computing case study","volume":"1","author":"Jouini M.","year":"2012","unstructured":"Jouini , M. , Ben Arfa Rabai , L. , Ben Aissa , A. , Mili , A. 2012 . Towards quantitative measures of Information Security: A Cloud Computing case study , International Journal of Cyber-Security and Digital Forensics (IJCSDF) , 1 ( 3 ): 265 -- 279 . Jouini, M., Ben Arfa Rabai, L., Ben Aissa, A., Mili, A. 2012. Towards quantitative measures of Information Security: A Cloud Computing case study, International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(3): 265--279.","journal-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.jksuci.2012.06.002"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 100--105","author":"Ben Arfa Rabai L.","year":"2012","unstructured":"Ben Arfa Rabai , L. , Jouini , M. , Nafati , M. , Ben Aissa , A. , Mili , A. 2012 . An economic model of security threats for cloud computing systems , International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 100--105 . Ben Arfa Rabai, L., Jouini, M., Nafati, M., Ben Aissa, A., Mili, A. 2012. An economic model of security threats for cloud computing systems, International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 100--105."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.4018\/ijoci.2014070101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/CIS.2014.169"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.17706\/jcp.10.3.184-194"},{"key":"e_1_3_2_1_12_1","volume-title":"Technical report","author":"Ponemon Institute","year":"2014","unstructured":"Ponemon Institute . ( 2014 ). 2014 cost of data breach study: Global analysis , Technical report , Ponemon Institute LLC. Ponemon Institute. (2014). 2014 cost of data breach study: Global analysis, Technical report, Ponemon Institute LLC."},{"volume-title":"Computer Security Institute","author":"Robert R.","unstructured":"Robert , R. 2010. CSI\/FBI computer crime and security survey. Computer Security Institute , San Francisco . Robert, R. 2010. CSI\/FBI computer crime and security survey. Computer Security Institute, San Francisco.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5121\/ijcsit.2014.6103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2659651.2659659"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/882493.884387"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/WAINA.2010.39"},{"volume-title":"The 4+1 View Model of Architecture","author":"Kruchten P.","unstructured":"Kruchten , P. 1995. The 4+1 View Model of Architecture . IEEE Xplore Digital Library . Kruchten, P. 1995. The 4+1 View Model of Architecture. IEEE Xplore Digital Library.","key":"e_1_3_2_1_18_1"}],"event":{"acronym":"SIN '16","name":"SIN '16: 9th International Conference on Security of Information and Networks","location":"Newark NJ USA"},"container-title":["Proceedings of the 9th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2947626.2947630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2947626.2947630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:02Z","timestamp":1750223222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2947626.2947630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,20]]},"references-count":18,"alternative-id":["10.1145\/2947626.2947630","10.1145\/2947626"],"URL":"https:\/\/doi.org\/10.1145\/2947626.2947630","relation":{},"subject":[],"published":{"date-parts":[[2016,7,20]]},"assertion":[{"value":"2016-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}