{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:27:50Z","timestamp":1752668870480},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030022266"},{"type":"electronic","value":"9783030022273"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02227-3_12","type":"book-chapter","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T03:35:10Z","timestamp":1538451310000},"page":"173-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Ontology Framework for Generating Discrete-Event Stochastic Models"],"prefix":"10.1007","author":[{"given":"Ken","family":"Keefe","sequence":"first","affiliation":[]},{"given":"Brett","family":"Feddersen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Rausch","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Wright","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,3]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"DM Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Trans. Dependable Secure Comput. 1(1), 48\u201365 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats: Issues, Approaches, and Challenges","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches, and Challenges, pp. 247\u2013266. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-24230-9_9"},{"issue":"5","key":"12_CR3","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/32.815323","volume":"25","author":"R Ortalo","year":"1999","unstructured":"Ortalo, R., Deswarte, Y., Ka\u00e2niche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng. 25(5), 633\u2013650 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR4","unstructured":"LeMay, E.: Adversary-driven state-based system security evaluation. Ph.D. dissertation, University of Illinois at Urbana-Champaign, Urbana, Illinois (2011)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Clark, G., T. et al.: The M\u00f6bius modeling tool. In: Proceedings of the 9th International Workshop on Petri Nets and Performance Models, pp. 241\u2013250, September 2001","DOI":"10.1109\/PNPM.2001.953373"},{"key":"12_CR6","unstructured":"Williamson, A.L.: Discrete event simulation in the M\u00f6bius modeling framework. Master\u2019s thesis, University of Illinois at Urbana-Champaign, Urbana, Illinois (1998)"},{"issue":"2","key":"12_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquis. 5(2), 199\u2013220 (1993)","journal-title":"Knowl. Acquis."},{"issue":"10","key":"12_CR8","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"DD Deavours","year":"2002","unstructured":"Deavours, D.D., et al.: The M\u00f6bius framework and its implementation. IEEE Trans. Softw. Eng. 28(10), 956\u2013969 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"LeMay, E., Unkenholz, W., Parks, D., Muehrcke, C., Keefe, K., Sanders, W.H.: Adversary-driven state-based system security evaluation. In: Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec 2010), Bolzano-Bozen, Italy, 15 September 2010","DOI":"10.1145\/1853919.1853926"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Ford, M.D., Keefe, K., LeMay, E., Sanders, W.H., Muehrcke, C.: Implementing the ADVISE secrity modeling formalism in M\u00f6bius. In: Proceedigns of the 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2013), pp. 1\u20138, June 2013","DOI":"10.1109\/DSN.2013.6575362"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using ADversary VIew Security Evaluation (ADVISE). In: Proceedings of the 8th Interantional Confernece on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, pp. 191\u2013200, 5\u20138 September 2011","DOI":"10.1109\/QEST.2011.34"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-319-43425-4_19","volume-title":"Quantitative Evaluation of Systems","author":"M Rausch","year":"2016","unstructured":"Rausch, M., Feddersen, B., Keefe, K., Sanders, W.H.: A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE. In: Agha, G., Van Houdt, B. (eds.) QEST 2016. LNCS, vol. 9826, pp. 279\u2013294. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43425-4_19"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Wright, R., Keefe, K., Feddersen, B., Sanders, W.H.: A case study assessing the effects of cyber attacks on a river zonal dispatcher. In: Proceedings of the 11th International Conference on Critical Information Infrastructures Security (CRITIS), Paris, France, pp. 252\u2013264, 10\u201312 October 2016","DOI":"10.1007\/978-3-319-71368-7_21"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Deavours, D., Sanders, W.H.: M\u00f6bius: framework and atomic models. In: Proceedingso of the 10th International Workshop on Petri Nets and Performance Models, pp. 251\u2013260, September 2001","DOI":"10.1109\/PNPM.2001.953374"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Rausch, M., Keefe, K., Feddersen, B., Sanders, W.H.: Automatically generating security models from system models to aid in the evaluation of AMI deployment options. In: Proceedings of the 12th International Conferece on Critical Information Infrastructures Security (CRITIS), Lucca, Italy, 8\u201313 October 2017","DOI":"10.1007\/978-3-319-99843-5_14"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Cheh, C., Keefe, K., Feddersen, B., Chen, B., Temple, W.G., Sanders, W.: Developing models for physical attacks in cyber-physical systems. In: Proceedings of the Cyber-Physical Systems Security and PrivaCy (CPS-SPC) Workshop, Dallas, Texas, USA, pp. 49\u201355, 3 November 2017","DOI":"10.1145\/3140241.3140249"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-662-49665-7_17","volume-title":"Fundamental Approaches to Software Engineering","author":"P Chrszon","year":"2016","unstructured":"Chrszon, P., Dubslaff, C., Kl\u00fcppelholz, S., Baier, C.: Family-based modeling and analysis for probabilistic systems \u2013 featuring ProFeat. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 287\u2013304. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49665-7_17"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10270-013-0385-x","volume":"13","author":"M Woodside","year":"2014","unstructured":"Woodside, M., Petriu, D.C., Merseguer, J., Petriu, D.B., Alhaj, M.: Transformation challenges: from software models to performance models. Softw. Syst. Model. 13(4), 1529\u20131552 (2014)","journal-title":"Softw. Syst. Model."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Nielson, H.R.: Automated generation of attack trees. In: Proceedings of the IEEE 27th Computer Security Foundations Symposium, pp. 337\u2013350, July 2014","DOI":"10.1109\/CSF.2014.31"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-29968-6_6","volume-title":"Graphical Models for Security","author":"MG Ivanova","year":"2016","unstructured":"Ivanova, M.G., Probst, C.W., Hansen, R.R., Kamm\u00fcller, F.: Transforming graphical system models to graphical attack models. In: Mauw, S., Kordy, B., Jajodia, S. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 82\u201396. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29968-6_6"},{"issue":"10","key":"12_CR21","doi-asserted-by":"publisher","first-page":"1444","DOI":"10.1016\/j.jss.2005.12.022","volume":"79","author":"S Philippi","year":"2006","unstructured":"Philippi, S.: Automatic code generation from high-level Petri-nets for model driven systems engineering. J. Syst. Softw. 79(10), 1444\u20131455 (2006)","journal-title":"J. Syst. Softw."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Bernardi, S., Donatelli, S., Merseguer, J.: From UML sequence diagrams and statecharts to analysable Petri net models. In: Proceedings of the 3rd International Workshop on Software and Performance, pp. 35\u201345. ACM (2002)","DOI":"10.1145\/584369.584376"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2005.12.059","volume":"159","author":"A Kamandi","year":"2006","unstructured":"Kamandi, A., Azgomi, M.A., Movaghar, A.: Transformation of UML models into analyzable OSAN models. Electron. Notes Theor. Comput. Sci. 159, 3\u201322 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Gheraibia, Y., Bourouis, A.: Ontology and automatic code generation on modeling and simulation. In: 6th Internatioal Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 69\u201373. IEEE (2012)","DOI":"10.1109\/SETIT.2012.6481892"},{"key":"12_CR25","unstructured":"Lacy, L.: Interchanging discrete event simulation process interaction models using PIMODES and SRML. In: Proceedings of the Fall 2006 Simulation Interoperability Workshop (2006)"},{"key":"12_CR26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02546-4","volume-title":"Model-Driven Software Engineering in Practice","author":"M Brambilla","year":"2012","unstructured":"Brambilla, M., Cabot, J., Wimmer, M.: Model-Driven Software Engineering in Practice. Morgan & Claypool Publishers, San Rafael (2012)"},{"key":"12_CR27","volume-title":"EMF: Eclipse Modeling Framework","author":"D Steinberg","year":"2008","unstructured":"Steinberg, D., Budinsky, F., Merks, E., Paternostro, M.: EMF: Eclipse Modeling Framework. Pearson Education, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Performance Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02227-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T11:22:50Z","timestamp":1693912970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02227-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030022266","9783030022273"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02227-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"EPEW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Workshop on Performance Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"epew2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/epew2018.lacl.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"27","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}