{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:24:57Z","timestamp":1764174297462},"reference-count":26,"publisher":"IBM","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1147\/jrd.2016.2557638","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T14:48:29Z","timestamp":1469630909000},"page":"2:1-2:12","source":"Crossref","is-referenced-by-count":8,"title":["Data classification and sensitivity estimation for critical asset discovery"],"prefix":"10.1147","volume":"60","author":[{"given":"Y.","family":"Park","sequence":"first","affiliation":[]},{"given":"W.","family":"Teiken","sequence":"additional","affiliation":[]},{"given":"J. R.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"S. N.","family":"Chari","sequence":"additional","affiliation":[]}],"member":"3082","reference":[{"key":"ref10","first-page":"190","article-title":"Data sensitivity: Proposals for resolving the conundrum","volume":"2","author":"mccullagh","year":"2007","journal-title":"Journal of International Commercial Law and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978681"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998464"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324904003523"},{"key":"ref14","author":"mccallum","year":"2002","journal-title":"Mallet A machine learning for language toolkit"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345593"},{"key":"ref16","first-page":"1824","article-title":"On flat versus hierarchical classification in large-scale taxonomies","author":"rohit","year":"0","journal-title":"Proc NIPS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref19","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BDIM.2007.375015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949398"},{"key":"ref5","author":"bell","year":"1996","journal-title":"Secure Computer Systems Mathematical Foundations"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.21236\/ADA550373","author":"kim","year":"2011","journal-title":"Determining asset criticality for cyber defense"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2006.32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2371316.2371374"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"ref1","year":"0","journal-title":"OSF data loss DB"},{"key":"ref20","author":"yang","year":"2006","journal-title":"Distance metric learning A comprehensive survey"},{"key":"ref22","first-page":"11","article-title":"Learning distance functions using equivalence relations","author":"bar-hillel","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref21","first-page":"1","article-title":"Distance metric learning for large margin nearest neighbor classification","author":"weinberger","year":"0","journal-title":"Proc NIPS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"ref26","first-page":"18","article-title":"Identifying critical attack assets in dependency attack graphs","author":"sawilla","year":"0","journal-title":"Proc 13th ESORICS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/290941.291017"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5288520\/7523342\/07523364.pdf?arnumber=7523364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T16:23:09Z","timestamp":1568218989000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=7523364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":26,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2016.2557638","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"value":"0018-8646","type":"print"},{"value":"0018-8646","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}