{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:15Z","timestamp":1763467815738},"publisher-location":"New York, NY","reference-count":10,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_23","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T05:45:53Z","timestamp":1194932753000},"page":"331-343","source":"Crossref","is-referenced-by-count":11,"title":["Investigating Computer Attacks Using Attack Trees"],"prefix":"10.1007","author":[{"given":"Nayot","family":"Poolsapassit","sequence":"first","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"P. Ammann, D. Wijesekera and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp. 217\u2013224, 2002.","DOI":"10.1145\/586110.586140"},{"key":"23_CR2","unstructured":"J. Dawkins, C. Campbell and J. Hale, Modeling network attacks: Extending the attack tree paradigm, Proceedings of the Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection, 2002."},{"key":"23_CR3","volume-title":"Technical Report CMU-CS-02-109","author":"S. Jha","year":"2002","unstructured":"S. Jha, O. Sheyner and J. Wing, Minimization and reliability analysis of attack graphs, Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2002."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"S. Jha, O. Sheyner and J. Wing, Two formal analyses of attack graphs, Proceedings of the Computer Security Foundations Workshop, pp. 45\u201359, 2002.","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"23_CR5","volume-title":"Technical Note CMU\/SEI-2001-TN-00l","author":"A. Moore","year":"2001","unstructured":"A. Moore, R. Ellison and R. Linger, Attack modeling for information survivability, Technical Note CMU\/SEI-2001-TN-00l, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2001."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"C. Phillips and L. Swiler, A graph-based system for network vulnerability analysis, Proceedings of the New Security Paradigms Workshop, pp. 71\u201379, 1998.","DOI":"10.1145\/310889.310919"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"R. Ritchey and P. Ammann, Using model checking to analyze network vulnerabilities, Proceedings of the IEEE Symposium on Security and Privacy, pp. 156\u2013165, 2000.","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"23_CR8","unstructured":"B. Schneier, Attack trees: Modeling security threats, Dr. Dobb\u2019s Journal, December 1999."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"O. Sheyner, J. Haines, S. Jha, R. Lippmann and J. Wing, Automated generation and analysis of attack graphs, Proceedings of the IEEE Symposium on Security and Privacy, pp. 273\u2013284, 2002.","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/DISCEX.2001.932182","volume":"2","author":"L. Swiler","year":"2001","unstructured":"L. Swiler, C. Phillips, D. Ellis and S. Chakerian, Computer-attack graph generation tool, Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 2, pp. 307\u2013321, 2001.","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:17:18Z","timestamp":1619655438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_23","relation":{},"subject":[]}}