{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:20:47Z","timestamp":1725992447603},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_5","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:22:22Z","timestamp":1537600942000},"page":"63-76","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Bio-inspired Approach to Attack Graphs Analysis"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Conti","sequence":"first","affiliation":[]},{"given":"Simone Sante","family":"Ruffo","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Migliardi","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Vitabile","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"5_CR1","unstructured":"Common Vulnerability Scoring System Version 3.0 Calculator (2017). https:\/\/www.first.org\/cvss\/calculator\/3.0"},{"issue":"4","key":"5_CR2","first-page":"29","volume":"5","author":"SAH Baddar","year":"2014","unstructured":"Baddar, S.A.H., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 5(4), 29\u201364 (2014)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web searchengine. Comput. Netw. ISDN Syst. 30(1), 107\u2013117 (1998). https:\/\/doi.org\/10.1016\/S0169-7552(98)00110-X . Proceedings of the Seventh International World Wide Web Conference","journal-title":"Comput. Netw. ISDN Syst."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Chokshi, I., Das, S., Ghosh, N., Ghosh, S., Kaushik, A., Sarkar, M.: NetSecuritas: an integrated attack graph-based security assessment tool for enterprise network. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking (2015)","DOI":"10.1145\/2684464.2684494"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Conti, V., Ruffo, S., Vitabile, S., Barolli, L.: BIAM: a new bio-inspired analysis methodology for digital ecosystems based on a scale-free architecture. Soft Comput. 1\u201318 (2017)","DOI":"10.1007\/s00500-017-2832-z"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Feng, P.: Wireless LAN security issues and solutions. In: 2012 IEEE Symposium on Robotics and Applications, ISRA, pp. 921\u2013924, June 2012. https:\/\/doi.org\/10.1109\/ISRA.2012.6219343","DOI":"10.1109\/ISRA.2012.6219343"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1504\/IJHPCN.2013.056525","volume":"7","author":"M Ficco","year":"2013","unstructured":"Ficco, M.: Security event correlation approach for cloud computing. Int. J. High Perform. Comput. Netw. 7(3), 173\u2013185 (2013)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"5_CR8","unstructured":"Ghosh, N., Ghosh, S.K.: An intelligent technique for generating minimal attack graph. In: First Workshop on Intelligent Security (Security and Artificial Intelligence), SecArt (2009)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-40588-4_25","volume-title":"Security Engineering and Intelligence Informatics","author":"N Gobbo","year":"2013","unstructured":"Gobbo, N., Merlo, A., Migliardi, M.: A denial of service attack to GSM networks via attach procedure. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8128, pp. 361\u2013376. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40588-4_25"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1038\/nature03288","volume":"433","author":"R Guimer","year":"2005","unstructured":"Guimer, R., Amaral, L.: Functional cartography of complex metabolic network. Nature 433, 895\u2013900 (2005)","journal-title":"Nature"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Jalan, S., Kumar, P., Das, S.: Formalization of digital forensic theory by using Buchi Automaton. In: 2015 Third International Conference on Image Information Processing, pp. 102\u2013108 (2015)","DOI":"10.1109\/ICIIP.2015.7414748"},{"issue":"5","key":"5_CR12","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.copbio.2003.08.001","volume":"14","author":"K Kauffman","year":"2003","unstructured":"Kauffman, K., Prakash, P., Edwards, J.: Advances in flux balance analysis. Curr. Opin. Biotechnol. 14(5), 491\u2013496 (2003)","journal-title":"Curr. Opin. Biotechnol."},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0920-5489(00)00047-7","volume":"22","author":"R Khoussainov","year":"2000","unstructured":"Khoussainov, R., Patel, A.: LAN security: problems and solutions for Ethernet networks. Comput. Stand. Interfaces 22(3), 191\u2013202 (2000). https:\/\/doi.org\/10.1016\/S0920-5489(00)00047-7","journal-title":"Comput. Stand. Interfaces"},{"key":"5_CR14","unstructured":"Kramer, D.: Attack-defence graph - on the formalisation of security-critical system. Master\u2019s thesis. Saarland University, Germania (2015)"},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCBB.2008.79","volume":"5","author":"V Lacroix","year":"2008","unstructured":"Lacroix, V., Cottret, L., Thbault, P., Sagot, M.: An introduction to metabolic networks and their structural analysis. IEEE\/ACM Trans. Comput. Biol. Bioinform. 5(4), 594\u2013617 (2008)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Merlo, A., Migliardi, M., Fontanelli, P.: On energy-based profiling of malware in Android, pp. 535\u2013542 (2014). https:\/\/doi.org\/10.1109\/HPCSim.2014.6903732","DOI":"10.1109\/HPCSim.2014.6903732"},{"key":"5_CR17","unstructured":"Migliardi, M., Merlo, A.: Modeling the energy consumption of distributed IDS: a step towards Green security, pp. 1452\u20131457 (2011). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-80052297709partnerID=40md5=f36e30763ec3bc927c69575ba628cf18"},{"issue":"1","key":"5_CR18","first-page":"135","volume":"1","author":"S Noel","year":"2010","unstructured":"Noel, S., Wang, L., Singhal, A., Jajodia, S.: Measuring security risk of networks using attack graphs. Proc. Int. J. Next-Gener. Comput. 1(1), 135\u2013147 (2010)","journal-title":"Proc. Int. J. Next-Gener. Comput."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"12412","DOI":"10.1109\/ACCESS.2018.2805862","volume":"6","author":"M Pasha","year":"2018","unstructured":"Pasha, M., Qaiser, G., Pasha, U.: A critical analysis of software risk management techniques in large scale systems. IEEE Access 6, 12412\u201312424 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2805862","journal-title":"IEEE Access"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1006\/jtbi.2000.1073","volume":"203","author":"C Schilling","year":"2000","unstructured":"Schilling, C., Letscher, D., Palsson, B.: Theory for the systemic definition of metabolic pathways and their use in interpreting metabolic function from a pathway-oriented perspective. J. Theoret. Biol. 203(3), 229\u2013248 (2000)","journal-title":"J. Theoret. Biol."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graph. NIST Interagency Report (7788) (2011)","DOI":"10.6028\/NIST.IR.7788"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-540-77048-0_37","volume-title":"Information and Communications Security","author":"JJ Treinen","year":"2007","unstructured":"Treinen, J.J., Thurimella, R.: Application of the PageRank algorithm to alarm graphs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 480\u2013494. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77048-0_37"},{"key":"5_CR23","unstructured":"US-CERT Security Operations Center: Security Operations NVD-2017 (2017). https:\/\/nvd.nist.gov\/info\/contact"},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TCDS.2016.2608500","volume":"9","author":"G Vitello","year":"2017","unstructured":"Vitello, G., Alongi, A., Conti, V., Vitabile, S.: A bio-inspired cognitive agent for autonomous urban vehicles routing optimization. IEEE Trans. Cogn. Dev. Syst. 9(1), 5\u201315 (2017)","journal-title":"IEEE Trans. Cogn. Dev. Syst."},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-70567-3_22","volume-title":"Data and Applications Security XXII","author":"L Wang","year":"2008","unstructured":"Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283\u2013296. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70567-3_22"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T13:05:36Z","timestamp":1571922336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}