{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:24:07Z","timestamp":1763580247985},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_20","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T14:51:56Z","timestamp":1160578316000},"page":"216-227","source":"Crossref","is-referenced-by-count":55,"title":["Attack Graph Based Evaluation of Network Security"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Stepashkin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"Managing Information Security Risks: The OCTAVE Approach","author":"C. Alberts","year":"2002","unstructured":"Alberts, C., Dorofee, A.: Managing Information Security Risks: The OCTAVE Approach. Addison-Wesley, Reading (2002)"},{"key":"20_CR2","volume-title":"Project Risk Management: processes, techniques and insights","author":"C. Chapman","year":"2003","unstructured":"Chapman, C., Ward, S.: Project Risk Management: processes, techniques and insights. John Wiley, Chichester (2003)"},{"key":"20_CR3","unstructured":"CVSS. Common Vulnerability Scoring System, \n                  \n                    http:\/\/www.first.org\/cvss\/"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Dantu, R., Loper, K., Kolan, P.: Risk Management using Behavior based Attack Graphs. In: International Conference on Information Technology: Coding and Computing (2004)","DOI":"10.1109\/ITCC.2004.1286496"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M., Raghavendra, C.S.: Impact Analysis of Faults and Attacks in Large-Scale Networks. IEEE Security&Privacy (September\/October 2003)","DOI":"10.1109\/MSECP.2003.1236235"},{"key":"20_CR6","unstructured":"Jha, S., Sheyner, O., Wing, J.: Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, Carnegie Mellon University (2002)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Lye, K., Wing, J.: Game Strategies in Network Security. International Journal of Information Security (February 2005)","DOI":"10.1007\/s10207-004-0060-x"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"S. Noel","year":"2005","unstructured":"Noel, S., Jajodia, S.: Understanding complex network attack graphs through clustered adjacency matrices. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740. Springer, Heidelberg (2005)"},{"key":"20_CR9","unstructured":"Netfilter\/iptables documentation, URL:\n                  \n                    http:\/\/www.netfilter.org\/documentation\/"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Ning, P., Cui, Y., Reeves, D., Xu, D.: Tools and Techniques for Analyzing Intrusion Alerts. ACM Transactions on Information and System Security\u00a07(2) (2004)","DOI":"10.1145\/996943.996947"},{"key":"20_CR11","unstructured":"OSVDB: The Open Source Vulnerability Database, URL:\n                  \n                    http:\/\/www.osvdb.org\/"},{"key":"20_CR12","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A Logic-based Network Security Analyzer. In: 14th Usenix Security Symposium (2005)"},{"key":"20_CR13","unstructured":"Rieke, R.: Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilising Attack Graph Exploration. In: EICAR 2004 (2004)"},{"key":"20_CR14","volume-title":"Proceedings of Symposium on Security and Privacy","author":"R.W. Ritchey","year":"2000","unstructured":"Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings of Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11562436_19","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2005","author":"G. Rothmaier","year":"2005","unstructured":"Rothmaier, G., Krumm, H.: A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks. In: Wang, F. (ed.) FORTE 2005. LNCS, vol.\u00a03731, pp. 247\u2013260. Springer, Heidelberg (2005)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proc. of the IEEE Symposium on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Singh, S., Lyons, J., Nicol, D.M.: Fast Model-based Penetration Testing. In: Proceedings of the 2004 Winter Simulation Conference (2004)","DOI":"10.1109\/WSC.2004.1371331"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: DISCEX 2001(2001)","DOI":"10.1109\/DISCEX.2001.932182"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T04:11:17Z","timestamp":1553141477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11909033_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}