{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:40:19Z","timestamp":1726044019408},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030308582"},{"type":"electronic","value":"9783030308599"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30859-9_15","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T12:03:26Z","timestamp":1568203406000},"page":"168-181","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Building Blocks of an Innovative Approach to Education in the Field of Cyber Operations in Smart Environment"],"prefix":"10.1007","author":[{"given":"Bla\u017e","family":"Ivanc","sequence":"first","affiliation":[]},{"given":"Iztok","family":"Podbregar","sequence":"additional","affiliation":[]},{"given":"Polona","family":"\u0160prajc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comcom.2014.06.009","volume":"52","author":"J Almasizadeh","year":"2014","unstructured":"Almasizadeh, J., Abdollahi Azgomi, M.: Mean privacy: a metric for security of computer systems. Comput. Commun. 52, 47\u201359 (2014)","journal-title":"Comput. Commun."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Celik, Z.B., et al.: Mapping sample scenarios to operational models. In: Military Communications Conference MILCOM (2016)","DOI":"10.1109\/MILCOM.2016.7795293"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Chang, Y.H., Jirutitijaroen, P., Ten, C.W.: A simulation model of cyber threats for energy metering devices in a secondary distribution network. In: Proceedings of the 5th International Conference on Critical Infrastructure, pp. 1\u20137 (2010)","DOI":"10.1109\/CRIS.2010.5617494"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10207-012-0160-y","volume":"11","author":"R Dewri","year":"2012","unstructured":"Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167\u2013188 (2012)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR5","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-47671-1_6","volume-title":"Open Source Intelligence Investigation","author":"H Gibson","year":"2016","unstructured":"Gibson, H.: Acquisition and preparation of data for OSINT investigations. In: Akhgar, B., Bayerl, P., Sampson, F. (eds.) Open Source Intelligence Investigation. ASTSA, pp. 69\u201393. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47671-1_6"},{"key":"15_CR6","unstructured":"Hong, J., Kim, D.S.: HARMs: Hierarchical Attack Representation Models for Network Security Analysis (2012)"},{"key":"15_CR7","unstructured":"Ivanc, B.: Modelling of information attacks on critical infrastructure by using an enhanced structural model. Master thesis (2013)"},{"key":"15_CR8","unstructured":"Ivanc, B.: Providing information privacy with attack modelling: from simple techniques to the enhanced structural model. In: Corporate Security: Open Dilemmas in the Modern Information Society, pp. 161\u2013168 (2014)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M.: Cauldron - mission-centric cyber situational awareness with defense in depth. In: Military Communications Conference (MILCOM 2011), pp. 1\u20136 (2011)","DOI":"10.1109\/MILCOM.2011.6127490"},{"issue":"11","key":"15_CR10","first-page":"293","volume":"10","author":"KH Kim","year":"2016","unstructured":"Kim, K.H., Eom, J.H.: Modeling of cyber target selection for effective acquisition of cyber weapon systems. Int. J. Secur. Appl. 10(11), 293\u2013302 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"15_CR11","first-page":"1","volume":"13\u201314","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modelling: Don\u2019t miss the forest for the attack trees. Comput. Sci. Rev.w 13\u201314, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev.w"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, S., Carley, K.M.: Understanding DDoS cyber-attacks using social media analytics. In: Conference on Intelligence and Security Informatics (ISI), pp. 231\u2013236 (2016)","DOI":"10.1109\/ISI.2016.7745480"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System Version 2.0 (2007)","DOI":"10.1049\/iet-ifs:20060055"},{"issue":"3","key":"15_CR14","first-page":"165","volume":"19","author":"S Paul","year":"2014","unstructured":"Paul, S., Vignon-Davillier, R.: Unifying traditional risk assessment approaches with attack trees. J. Inf. Secur. Appl. 19(3), 165\u2013181 (2014)","journal-title":"J. Inf. Secur. Appl."},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.ress.2012.09.011","volume":"110","author":"L Pi\u00e8tre-Cambac\u00e9d\u00e8s","year":"2013","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110\u2013126 (2013)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2017.04.007","volume":"74","author":"K Pipyrosa","year":"2018","unstructured":"Pipyrosa, K., Thraskiasb, C., Mitroua, L., Gritzalisa, D., Apostolopoulos, T.: A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. Comput. Secur. 74, 371\u2013383 (2018)","journal-title":"Comput. Secur."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Strahonja, V.: The evaluation criteria of workflow metamodels. In: Proceedings of the International Conference on Information Technology Interfaces, pp. 553\u2013558 (2007)","DOI":"10.1109\/ITI.2007.4283831"},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","volume":"40","author":"CW Ten","year":"2010","unstructured":"Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(4), 853\u2013865 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30859-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T06:14:44Z","timestamp":1664345684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30859-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030308582","9783030308599"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30859-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rusmart.e-werest.org\/2019.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}