{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:57:11Z","timestamp":1725544631404},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333548"},{"type":"electronic","value":"9783540333555"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734727_16","type":"book-chapter","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T15:57:27Z","timestamp":1152547047000},"page":"175-185","source":"Crossref","is-referenced-by-count":5,"title":["A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks"],"prefix":"10.1007","author":[{"given":"Young-Gab","family":"Kim","sequence":"first","affiliation":[]},{"given":"Taek","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hoh Peter","family":"In","sequence":"additional","affiliation":[]},{"given":"Yoon-Jung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"InJung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Doo-Kwon","family":"Baik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-540-30585-9_56","volume-title":"Systems Modeling and Simulation: Theory and Applications","author":"H.P. In","year":"2005","unstructured":"In, H.P., Kim, Y.-G., Lee, T., Moon, C.-J., Jung, Y., Kim, I.: A Security Analysis Model for Information Systems. In: Baik, D.-K. (ed.) AsiaSim 2004. LNCS (LNAI), vol.\u00a03398, pp. 505\u2013513. Springer, Heidelberg (2005)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems, NIST Special Publication 800-30, NIST (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"16_CR3","unstructured":"GAO: Information Security Risk Assetment-Practices of Leading Organizations. GAO\/AIMD-00-33 (1999)"},{"key":"16_CR4","volume-title":"Probability and Statistics with Reliability, Queuing and Computer Science Applications","author":"K.S. Trivedi","year":"2002","unstructured":"Trivedi, K.S.: Probability and Statistics with Reliability, Queuing and Computer Science Applications, 2nd edn. Wiley Interscience, Chichester (2002)","edition":"2"},{"key":"16_CR5","volume-title":"Probability and Stochastic Process","author":"R.D. Yates","year":"2003","unstructured":"Yates, R.D., Goodman, D.J.: Probability and Stochastic Process, 2nd edn. Wiley International, Chichester (2003)","edition":"2"},{"key":"16_CR6","unstructured":"KISA: Statistics and Analysis on Hacking and Virus, http:\/\/www.krcert.or.kr"},{"key":"16_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-67795-3","volume-title":"Mathematical Modeling in Epidemiology","author":"J.C. Frauenthal","year":"1980","unstructured":"Frauenthal, J.C.: Mathematical Modeling in Epidemiology. Springer, New York (1980)"},{"key":"16_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511608834","volume-title":"Epidemic Modeling : An Introduction","author":"D.J. Deley","year":"1999","unstructured":"Deley, D.J., Gani, J.: Epidemic Modeling: An Introduction. Cambridge University Press, Cambridge (1999)"},{"key":"16_CR9","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: The proceedings of the 11th USENIX Security Symposium (Security 2002) (2002)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense. In: ACM CCS Workshop on Rapid Malcode (WORM 2003) (2003)","DOI":"10.1145\/948187.948197"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Code Red Worm Propagation Modeling and Analysis. In: The proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 138\u2013147 (2002)","DOI":"10.1145\/586110.586130"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet Quarantine: Requirements for Containing Self-Propagating Code. The proceedings of IEEE INFOCOM (2003)","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Z., Gao, L., Kwiat, K.: Modeling the Spread of Active Worms. The proceedings of IEEE INFOCOM 2003 (2003)","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"16_CR14","unstructured":"Vogt, T.: Simulating and Optimising Worm Propagation Algorithms (2003), http:\/\/web.lemuria.org\/security\/WormPropagation.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734727_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T23:12:21Z","timestamp":1555715541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734727_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333548","9783540333555"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11734727_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}