{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:58:55Z","timestamp":1775289535644,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030048334","type":"print"},{"value":"9783030048341","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04834-1_1","type":"book-chapter","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T07:46:31Z","timestamp":1543477591000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,30]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi, F.H., Harris, R.J., Moretti, G., Haider, A., Anwar, N.: Classification of malicious network streams using honeynets. In: Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM 2012), pp. 891\u2013897. IEEE, Anaheim, CA, USA, December 2012","DOI":"10.1109\/GLOCOM.2012.6503226"},{"key":"1_CR2","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-11391-3_4","volume-title":"Cyber Defense and Situational Awareness","author":"M Albanese","year":"2014","unstructured":"Albanese, M., Jajodia, S.: Formation of awareness. In: Kott, A., Wang, C., Erbacher, R.F. (eds.) Cyber Defense and Situational Awareness. AIS, vol. 62, pp. 47\u201362. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11391-3_4"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Albanese, M., Battista, E., Jajodia, S., Casola, V.: Manipulating the attacker\u2019s view of a system\u2019s attack surface. In: IEEE Conference on Communications and Network Security, CNS 2014, pp. 472\u2013480, San Francisco, CA, USA, October 2014","DOI":"10.1109\/CNS.2014.6997517"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1177\/1548512917706043","volume":"15","author":"M Albanese","year":"2018","unstructured":"Albanese, M., Jajodia, S.: A graphical model to assess the impact of multi-step attacks. J. Def. Model. Simul. 15(1), 79\u201393 (2018)","journal-title":"J. Def. Model. Simul."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., Noel, S.: Time-efficient and cost-effective network hardening using attack graphs. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, USA, June 2012","DOI":"10.1109\/DSN.2012.6263942"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-23822-2_23","volume-title":"Computer Security \u2013 ESORICS 2011","author":"M Albanese","year":"2011","unstructured":"Albanese, M., Jajodia, S., Pugliese, A., Subrahmanian, V.S.: Scalable analysis of attack scenarios. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 416\u2013433. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23822-2_23"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., Singhal, A., Wang, L.: An efficient approach to assessing the risk of zero-day. In: Samarati, P. (ed.) Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp. 207\u2013218. SciTePress, Reykjav\u00edk, Iceland (July 2013)","DOI":"10.5220\/0004530602070218"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-540-24852-1_21","volume-title":"Applied Cryptography and Network Security","author":"SW Boyd","year":"2004","unstructured":"Boyd, S.W., Keromytis, A.D.: SQLrand: preventing SQL injection attacks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 292\u2013302. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24852-1_21"},{"key":"1_CR9","unstructured":"Christey, S.: 2011 CWE\/SANS top 25 most dangerous software errors (2011). http:\/\/cwe.mitre.org\/top25\/"},{"key":"1_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-319-58469-0_9","volume-title":"ICT Systems Security and Privacy Protection","author":"W Connell","year":"2017","unstructured":"Connell, W., Albanese, M., Venkatesan, S.: A framework for moving target defense quantification. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 124\u2013138. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58469-0_9"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-13841-1_1","volume-title":"Information Systems Security","author":"G Cybenko","year":"2014","unstructured":"Cybenko, G., Jajodia, S., Wellman, M.P., Liu, P.: Adversarial and uncertain reasoning for adaptive cyber defense: building the scientific foundation. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 1\u20138. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13841-1_1"},{"key":"1_CR12","volume-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"EM Hutchins","year":"2010","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Lockheed Martin Corporation, Bethesda (2010)"},{"key":"1_CR13","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-1-4419-0140-8_7","volume-title":"Cyber Situational Awareness","author":"S Jajodia","year":"2010","unstructured":"Jajodia, S., Noel, S.: Topological vulnerability analysis. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. Advances in Information Security, vol. 46, pp. 139\u2013154. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-0140-8_7"},{"key":"1_CR14","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8","volume-title":"Moving Target Defense II: Application of Game Theory and Adversarial Modeling","year":"2013","unstructured":"Jajodia, S., Ghosh, A.K., Subrahmanian, V.S., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Advances in Information Security, vol. 100. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-5416-8"},{"key":"1_CR15","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security, vol. 54. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0977-9"},{"key":"1_CR16","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8","volume-title":"Cyber Situational Awareness: Issues and Research","year":"2010","unstructured":"Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.): Cyber Situational Awareness: Issues and Research. Advances in Information Security. Springer, New York (2010). https:\/\/doi.org\/10.1007\/978-1-4419-0140-8"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J.: Cauldron: mission-centric cyber situational awareness with defense in depth. In: Proceedings of the Military Communications Conference (MILCOM 2011), pp. 1339\u20131344. Baltimore, MD, USA, November 2011","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"1_CR18","series-title":"Massive Computing","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats: Issues, Approaches, and Challenges","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches, and Challenges. MACO, vol. 5, pp. 247\u2013266. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-24230-9_9"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MSP.2008.9","volume":"6","author":"DJ Leversage","year":"2008","unstructured":"Leversage, D.J., Byres, E.J.: Estimating a system\u2019s mean time-to-compromise. IEEE Secur. Priv. 6(1), 52\u201360 (2008)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"1_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"PK Manadhata","year":"2011","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Software Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"McHugh, J.: Quality of protection: measuring the unmeasurable? In: Proceedings of the 2nd ACM Workshop on Quality of Protection (QoP 2006), pp. 1\u20132. ACM, Alexandria, VA, USA, October 2006","DOI":"10.1145\/1179494.1179495"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Natrajan, A., Ning, P., Liu, Y., Jajodia, S., Hutchinson, S.E.: NSDMiner: Automated discovery of network service dependencies. In: Proceedings of the 31st Annual International Conference on Computer Communications (INFOCOM 2012), pp. 2507\u20132515, Orlando, FL, USA, March 2012","DOI":"10.1109\/INFCOM.2012.6195642"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of the ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004), pp. 109\u2013118. ACM, Fairfax, VA, USA, October 2004","DOI":"10.1145\/1029208.1029225"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-70567-3_22","volume-title":"Data and Applications Security XXII","author":"L Wang","year":"2008","unstructured":"Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283\u2013296. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70567-3_22"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-642-15497-3_35","volume-title":"Computer Security \u2013 ESORICS 2010","author":"L Wang","year":"2010","unstructured":"Wang, L., Jajodia, S., Singhal, A., Noel, S.: k-zero day safety: measuring the security risk of networks against unknown attacks. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 573\u2013587. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_35"},{"issue":"18","key":"1_CR26","doi-asserted-by":"publisher","first-page":"3812","DOI":"10.1016\/j.comcom.2006.06.018","volume":"29","author":"L Wang","year":"2006","unstructured":"Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Comput. Commun. 29(18), 3812\u20133824 (2006)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","From Database to Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04834-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:11:22Z","timestamp":1775286682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04834-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030048334","9783030048341"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04834-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}