{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T10:40:15Z","timestamp":1736505615053,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308195"},{"type":"electronic","value":"9783540315988"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596981_60","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T14:42:27Z","timestamp":1150555347000},"page":"415-420","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of Windows System Security Using Vulnerability Relationship Graph"],"prefix":"10.1007","author":[{"given":"Yongzheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"60_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/52.776951","volume":"16","author":"J. Michener","year":"1999","unstructured":"Michener, J.: System Insecurity in the Internet Age. IEEE Software\u00a016(4), 62\u201369 (1999)","journal-title":"IEEE Software"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Jiwnani, K., Zelkowitz, M.: Maintaining Software with A Security Perspective. In: ICSM 2002, Montr\u00e9al, pp. 194\u2013203 (2002)","DOI":"10.1109\/ICSM.2002.1167766"},{"key":"60_CR3","unstructured":"Hedbom, H., Lindskog, S., Axelsson, S., Jonsson, E.: A Comparison of the Security of Windows NT and UNIX. In: Third Nordic Workshop on Secure IT Systems (November 1998)"},{"key":"60_CR4","unstructured":"Wang, L.D.: Quantitative Security Risk Assessment Method for Computer System and Network (In Chinese). Ph.D. Thesis, Harbin Institute of Technology (2002)"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Y.Z., Yun, X.C.: A New Vulnerability Taxonomy Based on Privilege Escalation. In: Proceedings of the 6th ICEIS, vol.\u00a03, pp. 596\u2013600 (2004)","DOI":"10.5220\/0002593205960600"},{"key":"60_CR6","unstructured":"Fang, B.X.: Network and Information Security, and Its Novel Technology (2001), http:\/\/pact518.hit.edu.cn\/view\/view\/frame.htm"},{"issue":"12","key":"60_CR7","first-page":"21","volume":"24","author":"B. Schneier","year":"1999","unstructured":"Schneier, B.: Attack Trees. Dr. Dobb\u2019s Journal\u00a024(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s Journal"},{"issue":"1","key":"60_CR8","first-page":"43","volume":"1","author":"Y.Z. Zhang","year":"2005","unstructured":"Zhang, Y.Z., Yun, X.C., Fang, B.X.(eds.): A Mining Method for Computer Vulnerability Correlation. Int. J. Innovative Computing, Information and Control.\u00a01(1), 43\u201351 (2005)","journal-title":"Int. J. Innovative Computing, Information and Control."},{"key":"60_CR9","unstructured":"SecurityFocus: Bugtraq (2005), http:\/\/www.securityfocus.com\/bid\/"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596981_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T12:04:42Z","timestamp":1736424282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596981_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308195","9783540315988"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11596981_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}