{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:11Z","timestamp":1750309331216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"UK EPSRC","award":["EP\/T027037\/1"],"award-info":[{"award-number":["EP\/T027037\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,13]]},"DOI":"10.1145\/3675741.3675747","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T16:34:45Z","timestamp":1722962085000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Measuring Cyber Essentials Security Policies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4285-3415","authenticated-orcid":false,"given":"S\u00e1ndor","family":"Bartha","sequence":"first","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5800-512X","authenticated-orcid":false,"given":"Russell","family":"Ballantine","sequence":"additional","affiliation":[{"name":"TEK Systems Global Services, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6073-9013","authenticated-orcid":false,"given":"David","family":"Aspinall","sequence":"additional","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"volume-title":"An agile framework for quantitative risk assessment in a Security Operations Centre (SOC). Master\u2019s thesis","author":"Ballantine Russell","key":"e_1_3_2_1_1_1","unstructured":"Russell Ballantine. 2020. An agile framework for quantitative risk assessment in a Security Operations Centre (SOC). Master\u2019s thesis. The University of Edinburgh."},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber Essentials: Requirements for IT infrastructure.https:\/\/www.ncsc.gov.uk\/files\/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-April-2023.pdf","author":"National Cyber\u00a0Security Centre.","year":"2023","unstructured":"National Cyber\u00a0Security Centre. 2023. Cyber Essentials: Requirements for IT infrastructure.https:\/\/www.ncsc.gov.uk\/files\/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-April-2023.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"The\u00a0MITRE Corporation. 1999-2024. Common Vulnerabilities and Exposures. https:\/\/www.cve.org\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.02.012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.07.001"},{"key":"e_1_3_2_1_6_1","unstructured":"Luis Mu\u00f1oz-Gonz\u00e1lez and Emil\u00a0C. Lupu. 2017. IST-153 Workshop on Cyber Resilience Bayesian Attack Graphs for Security Risk Assessment. https:\/\/api.semanticscholar.org\/CorpusID:39116470"},{"key":"e_1_3_2_1_7_1","unstructured":"Forum of Incident\u00a0Response and Security Teams. 2015\u20142024. Common Vulnerability Scoring System version 3.1 User Guide. https:\/\/www.first.org\/cvss\/v3.1\/user-guide"},{"key":"e_1_3_2_1_8_1","unstructured":"National\u00a0Institute of Standards and Technology. 2024. Cybersecurity Framework. https:\/\/www.nist.gov\/cyberframework"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995967"},{"key":"e_1_3_2_1_10_1","unstructured":"Tenable. 2024. Nessus. https:\/\/www.tenable.com\/products\/nessus"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3272670"}],"event":{"name":"CSET 2024: Workshop on Cyber Security Experimentation and Test","acronym":"CSET 2024","location":"Philadelphia PA USA"},"container-title":["Proceedings of the 17th Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675741.3675747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:09Z","timestamp":1750291449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":11,"alternative-id":["10.1145\/3675741.3675747","10.1145\/3675741"],"URL":"https:\/\/doi.org\/10.1145\/3675741.3675747","relation":{},"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"2024-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}