{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:51Z","timestamp":1773150231659,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":23,"publisher":"Springer New York","isbn-type":[{"value":"9780387737416","type":"print"},{"value":"9780387737423","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73742-3_24","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T05:45:53Z","timestamp":1194932753000},"page":"345-357","source":"Crossref","is-referenced-by-count":28,"title":["Attack Patterns: A New Forensic and Design Tool"],"prefix":"10.1007","author":[{"given":"Eduardo","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Juan","family":"Pelaez","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Larrondo-Petrie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Z. Anwar, W. Yurcik, R. Johnson, M. Hafiz and R. Campbell, Multiple design patterns for VoIP security, Proceedings of the TwentyFifth IEEE Conference on Performance, Computing and Communications, 2006."},{"key":"24_CR2","volume-title":"Pattern-Oriented Software Architecture: A System of Patterns, Volume 1","author":"F. Buschmann","year":"1996","unstructured":"F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, Volume 1, Wiley, Chichester, United Kingdom, 1996."},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1113034.1113068","volume":"43","author":"E. Casey","year":"2006","unstructured":"E. Casey, Investigating sophisticated security breaches, Communications of the ACM, vol. 43(2), 48\u201354, 2006.","journal-title":"Communications of the ACM"},{"key":"24_CR4","unstructured":"CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania (\n                    http:\/\/www.cert.org\n                    \n                  )."},{"key":"24_CR5","unstructured":"M. Collier, The value of VoIP security (\n                    http:\/\/www.cconvergence.com\/showArticle.jhtml?articleID=22103933\n                    \n                  ), 2004."},{"key":"24_CR6","unstructured":"E. Fernandez and A. Kumar, A security pattern for rule-based intrusion detection, Proceedings of the Nordic Conference on Pattern Languages of Programs, 2005."},{"key":"24_CR7","first-page":"107","volume-title":"Integrating Security and Software Engineering: Advances and Future Vision","author":"E. Fernandez","year":"2006","unstructured":"E. Fernandez, M. Larrondo-Petrie, T. Sorgente and M. VanHilst, A methodology to develop secure systems using patterns, in Integrating Security and Software Engineering: Advances and Future Vision, H. Mouratidis and P. Giorgini (Eds.), IGI Publishing, Hershey, Pennsylvania, pp. 107\u2013126, 2006."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"E. Fernandez and J. Pelaez, Security patterns for voice over IP networks, Proceedings of the International Multiconference on Computing in the Global Information Technology, p. 33, 2007.","DOI":"10.1109\/ICCGI.2007.57"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-0-387-34831-5_10","volume-title":"Advanced Software Engineering: Expanding the Frontiers of Software Technology","author":"E. Fernandez","year":"2006","unstructured":"E. Fernandez, M. VanHilst, M. Larrondo-Petrie and S. Huang, Defining security requirements through misuse actions, in Advanced Software Engineering: Expanding the Frontiers of Software Technology, S. Ochoa and G. Roman (Eds.), Springer, New York, 123\u2013137, 2006."},{"key":"24_CR10","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1994","unstructured":"E. Gamma, R. Helm, R. Johnson and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley\/Pearson, Boston, Massachusetts, 1994."},{"key":"24_CR11","volume-title":"Exploiting Software: How to Break Code","author":"G. Hoglund","year":"2004","unstructured":"G. Hoglund and G. McGraw, Exploiting Software: How to Break Code, Addison-Wesley\/Pearson, Boston, Massachusetts, 2004."},{"key":"24_CR12","series-title":"NIST Special Publication 800-86","volume-title":"Guide to Integrating Forensic Techniques into Incident Response","author":"K. Kent","year":"2006","unstructured":"K. Kent, S. Chevalier, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006."},{"key":"24_CR13","volume-title":"AntiPatterns: Identification, Refactoring and Management","author":"P. Laplante","year":"2006","unstructured":"P. Laplante and C. Neill, AntiPatterns: Identification, Refactoring and Management, CRC Press, Boca Raton, Florida, 2006."},{"issue":"9","key":"24_CR14","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/32.317428","volume":"20","author":"N. Leveson","year":"1994","unstructured":"N. Leveson, M. Heimdahl, H. Hildreth and J. Reese, Requirements specification for process-control systems, IEEE Transactions on Software Engineering, vol. 20(9), pp. 684\u2013707, 1994.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"J. McDermott, Attack net penetration testing, Proceedings of the New Security Paradigms Workshop, pp. 15\u201322, 2000.","DOI":"10.1145\/366173.366183"},{"key":"24_CR16","volume-title":"Technical Note CMU\/SEI-2001-TN-001","author":"A. Moore","year":"2001","unstructured":"A. Moore, R. Ellison and R. Linger, Attack modeling for information security and survability, Technical Note CMU\/SEI-2001-TN-001, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2001."},{"key":"24_CR17","volume-title":"Thesis","author":"J. Pelaez","year":"2004","unstructured":"J. Pelaez, Security in VoIP networks, Master\u2019s Thesis, Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, Florida, 2004."},{"key":"24_CR18","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"M. Schumacher, E. Fernandez, D. Hybertson, F. Buschmann and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, Wiley, Chichester, United Kingdom, 2006."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"K. Shanmugasundaram, N. Memon, A. Savant and H. Bronnimann, ForNet: A distributed forensics network, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 1\u201316, 2003.","DOI":"10.1007\/978-3-540-45215-7_1"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"J. Steffan and M. Schumacher, Collaborative attack modeling, Proceedings of the ACM Symposium on Applied Computing, pp. 253\u2013259, 2002.","DOI":"10.1145\/508832.508843"},{"key":"24_CR21","unstructured":"Symantec, Antivirus Research Center (\n                    http:\/\/www.symantec.com\n                    \n                  )."},{"key":"24_CR22","unstructured":"[22] TMCnet.com, CRN finds security risk in VoIP applications (\n                    http:\/\/www.tmcnet.com\/usubmit\/2006\/01\/27\/1320122.htm\n                    \n                  ), January 27 2006."},{"key":"24_CR23","unstructured":"C. Wieser, J. Roning and A. Takanen, Security analysis and experiments for VoIP RTP media streams, Proceedings of the Eighth International Symposium on Systems and Information Security, 2006."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T14:03:52Z","timestamp":1558361032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387737416","9780387737423"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_24","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2007]]}}}