{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:42:16Z","timestamp":1755999736150,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF, CIS"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3317730","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Measures and metrics for the enforcement of critical security controls"],"prefix":"10.1145","author":[{"given":"Mohiuddin","family":"Ahmed","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ICNP.2009.5339690"},{"unstructured":"AlienVault 2019. AlienVault OSSIM. Retrieved March 1 2019 from https:\/\/www.alienvault.com\/products\/ossim  AlienVault 2019. AlienVault OSSIM. Retrieved March 1 2019 from https:\/\/www.alienvault.com\/products\/ossim","key":"e_1_3_2_1_2_1"},{"unstructured":"CIS 2019. Center for Internet Security. Retrieved March 1 2019 from https:\/\/www.cisecurity.org\/controls\/  CIS 2019. Center for Internet Security. Retrieved March 1 2019 from https:\/\/www.cisecurity.org\/controls\/","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ICDCS.2013.70"},{"unstructured":"Rapid7 2019. Rapid7 Global service. Retrieved March 1 2019 from https:\/\/www.rapid7.com\/solutions\/compliance\/critical-controls\/  Rapid7 2019. Rapid7 Global service. Retrieved March 1 2019 from https:\/\/www.rapid7.com\/solutions\/compliance\/critical-controls\/","key":"e_1_3_2_1_5_1"}],"event":{"sponsor":["National Security Agency National Security Agency"],"acronym":"HotSoS","name":"HotSoS: Hot Topics in the Science of Security Symposium","location":"Nashville Tennessee USA"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3317730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:52Z","timestamp":1750208272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317730"}},"subtitle":["a case study of boundary defense"],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":5,"alternative-id":["10.1145\/3314058.3317730","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3317730","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}