{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:10Z","timestamp":1725475930939},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_7","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"54-63","source":"Crossref","is-referenced-by-count":1,"title":["Information System Modeling for Analysis of Propagation Effects and Levels of Damage"],"prefix":"10.1007","author":[{"given":"InJung","family":"Kim","sequence":"first","affiliation":[]},{"given":"YoonJung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"YoungGyo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Systems Modeling and Simulation: Theory and Applications","author":"H.P. In","year":"2005","unstructured":"In, H.P., Kim, Y.-G., Lee, T., Moon, C.-J., Jung, Y., Kim, I.: Security Risk Analysis Model for Information Systems. In: Baik, D.-K. (ed.) AsiaSim 2004. LNCS (LNAI), vol.\u00a03398, Springer, Heidelberg (2005)"},{"key":"7_CR2","volume-title":"Infosec 2004","author":"Y.-K. Zhang","year":"2004","unstructured":"Zhang, Y.-K., Wang, F.-W., Zhang, Y.-Q., Ma, J.-F.: Worm Propagation Modeling and Analysis Based on Quarantine. In: Infosec 2004, November 14-16. ACM, New York (2004) ISBN:1-58113-955-1"},{"key":"7_CR3","unstructured":"Park, K.M., Kwang, D.: PSpice Understanding and Application (revised) (1992) ISBN 89-85305-02-6"},{"key":"7_CR4","volume-title":"Monographs on Theoretical Computer Science","author":"W. Reisig","year":"1985","unstructured":"Reisig, W.: Petri Nets, An Introduction, EATCS. In: Brauer, W., Rozenberg, G., Salomaa, A. (eds.) Monographs on Theoretical Computer Science. Springer, Berlin (1985)"},{"key":"7_CR5","volume-title":"Modern Structured Analysis","author":"E. Yourdon","year":"1989","unstructured":"Yourdon, E.: Modern Structured Analysis. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"7_CR6","unstructured":"Black, P.E. (ed.): Deterministic finite state machine, Dictionary of Algorithms and Data Structures, NIST, http:\/\/www.nist.gov\/dads\/HTML\/determFinitStateMach.html"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s100090050021","volume":"2","author":"L.M. Kristensen","year":"1998","unstructured":"Kristensen, L.M., Christensen, S., Jensen, K.: The Practitioner\u2019s Guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer\u00a02, 98\u2013132 (1998)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"7_CR8","volume-title":"SPICE: A Guide to Circuit Simulation and Analysis Using PSpice","author":"P. Tuinenga","year":"1995","unstructured":"Tuinenga, P.: SPICE: A Guide to Circuit Simulation and Analysis Using PSpice, 3rd edn. Prentice-Hall, Englewood Cliffs (1995) ISBN 0-13-158775-7","edition":"3"},{"key":"7_CR9","unstructured":"ISO\/IEC TR 13335, Information technology - Guidelines for the management of IT Security: GMITS (1998)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"CSE (Canadian Secutiy Establishment), A Guide to Security Risk Management for IT Systems, Government of Canada (1996)","DOI":"10.1016\/S1361-3723(96)90026-3"},{"volume-title":"Practical Hazops, Trips and Alarms (Paperback)","year":"2004","key":"7_CR11","unstructured":"MacDonald, D., Mackay, S. (eds.): Practical Hazops, Trips and Alarms (Paperback). Butterworth-Heinemann, Butterworths (2004)"},{"key":"7_CR12","unstructured":"RAC, Fault Tree Analysis Application Guide (1991)"},{"key":"7_CR13","unstructured":"CMU, OCTAVE (Operationally Critical Threat, Assets and Vulnerability Evalustion) (December 2001)"},{"key":"7_CR14","first-page":"25","volume":"49","author":"T. Dimitrakos","year":"2002","unstructured":"Dimitrakos, T., Bicarregui, J., Stolen, K.: CORAS - a framework for risk analysis of security critical systems. ERCIM News\u00a049, 25\u201326 (2002)","journal-title":"ERCIM News"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-540-24707-4_60","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"Y.-H. Bang","year":"2004","unstructured":"Bang, Y.-H., Jung, Y.J., Kim, I., Lee, N., Lee, G.S.: Design and Development of a Risk Analysis Automatic Tool. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 491\u2013499. Springer, Heidelberg (2004)"},{"key":"7_CR16","unstructured":"CRAMM, http:\/\/www.cramm.com"},{"key":"7_CR17","unstructured":"Palisade Corporation, @RISK, http:\/\/www.palisade.com"},{"key":"7_CR18","unstructured":"Countermeasures, Inc., The Buddy System, http:\/\/www.buddysystem.net"},{"key":"7_CR19","unstructured":"Information Security Management, Part 2. Specification for Information Security Management System, British Standards Institution (BSI)"},{"key":"7_CR20","unstructured":"BSI (2003), http:\/\/www.bsi.bund.de\/english\/gshb\/manual\/index.htm"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Dubendorfer, T., Wagner, A., Plattner, B.: An Economic Damage Model for Large Scale Internet Attacks. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprise (WET ICE 2004), pp. 1524\u20134547 (2004)","DOI":"10.1109\/ENABL.2004.11"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/11424826_10","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"I.J. Kim","year":"2005","unstructured":"Kim, I.J., Chung, Y.J., Lee, Y.G., Won, D.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 92\u2013101. Springer, Heidelberg (2005)"},{"key":"7_CR23","unstructured":"Kim, I.J., Jung, Y.J., Park, J.G., Won, D.: A Study on Security Risk Modeling over Information and Communication Infrastructure. In: SAM 2004, pp. 249\u2013253 (2004)"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/948187.948193","volume-title":"Proceedings of the 2003 ACM workshop on Rapid Malcode","author":"M. Liljenstam","year":"2003","unstructured":"Liljenstam, M., Nicol, D.M., Berk, V.H., Gray, R.S.: Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 24\u201333. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:00:11Z","timestamp":1619506811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11751595_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}