{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:47:18Z","timestamp":1763534838234,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540289630"},{"type":"electronic","value":"9783540319818"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11555827_14","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:10:29Z","timestamp":1127830229000},"page":"231-246","source":"Crossref","is-referenced-by-count":78,"title":["Using Attack Trees to Identify Malicious Attacks from Authorized Insiders"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Nayot","family":"Poolsapassit","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, pp. 217\u2013224 (November 2002)","DOI":"10.1145\/586110.586140"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Chinchani, R., Upadhyaya, S., Kwiat, K.: Towards the scalable implementation of a user level anomaly detection system. In: Proceedings of the 2002 IEEE MILCOM Conference, Anaheim, CA, vol.\u00a02, pp. 7\u201310 (October 2002)","DOI":"10.1109\/MILCOM.2002.1179706"},{"key":"14_CR3","unstructured":"Dawkins, J., Campbell, C., Hale, J.: Modeling network attacks: Extending the attack tree paradigm. In: Proceedings of the Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection Baltimore. Johns Hopkins University (June 2002)"},{"key":"14_CR4","unstructured":"Denning, D., Neumann, P.: Requirements and model for \u201dides\u201d - \u201da\u201d real-time intrusion detection expert system. Technical report, Technical Report, Computer Science Laboratory, SRI International (1985)"},{"key":"14_CR5","unstructured":"The SANS Institute. Intrusion detection faq (April 2004), Available at http:\/\/www.sans.org\/resources\/idfaq"},{"key":"14_CR6","unstructured":"Jha, S., Sheyner, O., Wing, J.: Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University (February 2002)"},{"key":"14_CR7","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings of the 2002 Computer Security Foundations Workshop, Nova Scotia, pp. 45\u201359 (June 2002)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information survivability. Technical Note CMU\/SEI-2001-TN-001, Carnegie Melon University \/ Software Engineering Institute (March 2001)","DOI":"10.21236\/ADA387544"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 New Security Paradigms Workshop, Chicago, IL, pp. 71\u201379 (January 1998)","DOI":"10.1145\/310889.310919"},{"key":"14_CR10","unstructured":"Ritchie, R.W., Ammann, P.: Using model checking to analyze network. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, CA (May 2000)"},{"key":"14_CR11","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb\u2019s Journal (December 1999)"},{"key":"14_CR12","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Computer Society Symposium on Security and Privacy, Oakland, CA (May 2002)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings of DISCEX \u20190: DARPA Information Survivability Conference and Exposition II, pp. 307\u2013321 (June 2001)","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Upadhyaya, S., Chinchani, R., Kwiat, K.: An analytical framework for reasoning about instrusions. In: Proceedings of the 2001 IEEE Symposium on Reliable Distributed Systems, New Orleans, LA, pp. 99\u2013108 (October 2001)","DOI":"10.1109\/RELDIS.2001.969760"},{"key":"14_CR15","unstructured":"Upadhyaya, S., Chinchani, R., Kwiat, K.: A comprehensive reasoning framework for information surviability. In: Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, NY, pp. 148\u2013155 (June 2001)"},{"key":"14_CR16","unstructured":"Upadhyaya, S., Kwiat, K.: A distributed concurrent intrusion detection scheme based on assertions. In: Proceedings of the SCS International Symposium on Performance Evaluation of Computer and Telecommunications Systems, Chicago, IL, pp. 369\u2013376 (July 1999)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11555827_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:45:44Z","timestamp":1736005544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11555827_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540289630","9783540319818"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11555827_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}