{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:13:37Z","timestamp":1742962417321,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030341381"},{"type":"electronic","value":"9783030341398"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34139-8_18","type":"book-chapter","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T00:02:54Z","timestamp":1572825774000},"page":"180-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Classification of Attacker Privileges Based on Deep Neural Network"],"prefix":"10.1007","author":[{"given":"Hailong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,4]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Aksu, M.U., Bicakci, K., Dilek, M.H., Ozbayoglu, A.M., et al.: Automated generation of attack graphs using NVD. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 135\u2013142. ACM (2018)","DOI":"10.1145\/3176258.3176339"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Aksu, M.U., Dilek, M.H., Tatl\u0131, E.\u0130., Bicakci, K., Dirik, H.I., Demirezen, M.U., Ayk\u0131r, T.: A quantitative CVSS-based cyber security risk assessment methodology for it systems. In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138. IEEE (2017)","DOI":"10.1109\/CCST.2017.8167819"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Cheikes, B.A., Cheikes, B.A., Kent, K.A., Waltermire, D.: Common platform enumeration: naming specification version 2.3. US Department of Commerce, National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.IR.7695"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Conneau, A., Schwenk, H., Barrault, L., Lecun, Y.: Very deep convolutional networks for text classification. arXiv preprint \narXiv:1606.01781\n\n (2016)","DOI":"10.18653\/v1\/E17-1104"},{"key":"18_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7970-4","volume-title":"Entropy and Information Theory","author":"RM Gray","year":"2011","unstructured":"Gray, R.M.: Entropy and Information Theory. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-7970-4"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"13949","DOI":"10.1109\/ACCESS.2018.2814818","volume":"6","author":"A Hassan","year":"2018","unstructured":"Hassan, A., Mahmood, A.: Convolutional recurrent deep learning model for sentence classification. IEEE Access 6, 13949\u201313957 (2018)","journal-title":"IEEE Access"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 121\u2013130. IEEE (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., Oberry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats, pp. 247\u2013266. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/0-387-24230-9_9"},{"key":"18_CR9","first-page":"27","volume":"29","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K.: A taxonomy for attack graph generation and usage in network security. J. Inf. Secur. Appl. 29, 27\u201356 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. arXiv preprint \narXiv:1408.5882\n\n (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"18_CR11","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint \narXiv:1412.6980\n\n (2014)"},{"key":"18_CR12","unstructured":"Lippmann, R.P., Ingols, K.W., Piwowarski, K.J.: Generating a multiple-prerequisite attack graph, 17 May 2016. US Patent 9,344,444"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Loper, E., Bird, S.: NLTK: the natural language toolkit. arXiv preprint cs\/0205028 (2002)","DOI":"10.3115\/1118108.1118117"},{"key":"18_CR14","unstructured":"Loria, S., Keen, P., Honnibal, M., Yankovsky, R., Karesh, D., Dempsey, E., et al.: Textblob: simplified text processing. Simplified Text Processing, Secondary TextBlob (2014)"},{"key":"18_CR15","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. In: Published by FIRST-Forum of Incident Response and Security Teams, vol. 1, p. 23 (2007)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ins.2019.06.031","volume":"502","author":"Han Qiu","year":"2019","unstructured":"Qiu, H., Kapusta, K., Lu, Z., Qiu, M., Memmi, G.: All-or-nothing data protection for ubiquitous communication: Challenges and perspectives. Information Sciences (2019)","journal-title":"Information Sciences"},{"key":"18_CR17","unstructured":"Salahi, A., Ansarinia, M.: Predicting network attacks using ontology-driven inference. arXiv preprint \narXiv:1304.0913\n\n (2013)"},{"issue":"7587","key":"18_CR18","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver, D., et al.: Mastering the game of go with deep neural networks and tree search. Nature 529(7587), 484 (2016)","journal-title":"Nature"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-66505-4_3","volume-title":"Network Security Metrics","author":"A Singhal","year":"2017","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. Network Security Metrics, pp. 53\u201373. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66505-4_3"},{"key":"18_CR20","unstructured":"Team C: Common vulnerability scoring system V3. 0: specification document. First.org (2015)"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"8599","DOI":"10.1109\/ACCESS.2018.2805690","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang, H., Chen, Z., Zhao, J., Di, X., Liu, D.: A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow. IEEE Access 6, 8599\u20138609 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34139-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T13:40:01Z","timestamp":1583502001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34139-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030341381","9783030341398"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34139-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"4 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Birmingham","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"786","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}