{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:03Z","timestamp":1725485883789},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_7","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"90-106","source":"Crossref","is-referenced-by-count":4,"title":["System Specification Based Network Modeling for Survivability Testing Simulation"],"prefix":"10.1007","author":[{"given":"HyungJong","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/S0167-4048(99)80115-1","volume":"18","author":"F. Cohen","year":"1999","unstructured":"F. Cohen, \u201cSimulating Cyber Attacks, Defences, and Consequences,\u201d Computer & Security, Vol.18, pp. 479\u2013518, 1999.","journal-title":"Computer & Security"},{"key":"7_CR2","series-title":"Technical Report","doi-asserted-by":"crossref","DOI":"10.21236\/ADA387544","volume-title":"Attack Modeling for Information Security and Survivability","author":"P. Moore","year":"2001","unstructured":"P. Moore, R. J. Ellison and R. C. Linger, \u201cAttack Modeling for Information Security and Survivability,\u201d Technical Report No. CMU\/SEI-2001-TR-001, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, March, 2001."},{"key":"7_CR3","series-title":"Technical Report","volume-title":"Survivable Network Analysis Method","author":"N. R. Mead","year":"2000","unstructured":"N. R. Mead, R. J. Ellison, R. C. Linger, T. Longstaff, and J. Mchugh, \u201cSurvivable Network Analysis Method,\u201d Technical Report No. CMU\/SEI-2000-TR-013, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, March, 2000."},{"key":"7_CR4","unstructured":"M. Bishop, \u201cVulnerabilities Analysis\u201d, Proceedings of the Recent Advances in Intrusion Detection, pp. 125\u2013136, September, 1999."},{"key":"7_CR5","unstructured":"P. Zeigler, H. Praehofer and T. Kim, Theory of Modeling and Simulation, Second Edition, Academic Press, 2000."},{"key":"7_CR6","unstructured":"M. Law and W. D. Kelton, Simulation Modeling and Analysis, Third Edition, McGraw Hill, 2000."},{"issue":"8","key":"7_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/381641.381662","volume":"44","author":"N. Ye","year":"2001","unstructured":"N. Ye and J. Giordano, \u201cCACA-A Process Control Approach to Cyber Attack Detection\u201d, Communications of the ACM, Vol.44(8), pp. 76\u201382, 2001.","journal-title":"Communications of the ACM"},{"issue":"3","key":"7_CR8","first-page":"133","volume":"18","author":"T. Cho","year":"2001","unstructured":"T\u00e6Ho Cho and HyungJong Kim, \u201cDEVS Simulation of Distributed Intrusion Detection System,\u201d Transactions of the Society for Computer Simulation International, vol. 18, no. 3, pp. 133\u2013146, September, 2001.","journal-title":"Transactions of the Society for Computer Simulation International"},{"key":"7_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/3-540-45861-1","volume-title":"Vulnerability Assessment Simulation for Information Infrastructure Protection","author":"H. Kim","year":"2002","unstructured":"HyungJong Kim, KyoungHee Ko, DongHoon Shin and HongGeun Kim, \u201cVulnerability Assessment Simulation for Information Infrastructure Protection\u201d, Proceedings of the Infrastructure Security Conference 2002, LNCS Vol. 2437, pp. 145\u2013161, October. 1\u20133, 2002."},{"key":"7_CR10","unstructured":"HyungJong Kim, HongGeun Kim and T\u00e6Ho Cho, \u201cSimulation Model Design of Computer Network for Vulnerability Assessment,\u201d Proceedings of International Workshop on Information Security Applications, pp.203\u2013217, September. 13\u201314, 2001."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T00:50:04Z","timestamp":1550364604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}