{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:16:39Z","timestamp":1766268999914},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030365363"},{"type":"electronic","value":"9783030365370"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36537-0_9","type":"book-chapter","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T23:46:17Z","timestamp":1574811977000},"page":"186-202","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Conceptual Abstraction of Attack Graphs\u00a0-\u00a0A Use Case of securiCAD"],"prefix":"10.1007","author":[{"given":"Xinyue","family":"Mao","sequence":"first","affiliation":[]},{"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[]},{"given":"Engla","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Ringdahl","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Lagerstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"9_CR1","unstructured":"Artz, M.L.: NetSPA: A Network Security Planning Architecture. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science (2019)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Ekstedt, M., Johnson, P., Lagerstr\u00f6m, R., Gorton, D., Nydr\u00e9n, J., Shahzad, K.: Securicad by foreseeti: a cad tool for enterprise cyber security management. In: 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop, pp. 152\u2013155. IEEE (2015)","DOI":"10.1109\/EDOCW.2015.40"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-85933-8_7","volume-title":"Visualization for Computer Security","author":"J Homer","year":"2008","unstructured":"Homer, J., Varikuti, A., Ou, X., McQueen, M.A.: Improving attack graph visualization through data reduction and attack grouping. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 68\u201379. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85933-8_7"},{"key":"9_CR4","unstructured":"Hong, J., Kim, D.: HARMs: hierarchical attack representation models for network security analysis. In: Australian Information Security Management Conference, p. 12 (2012)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2017.09.001","volume":"26","author":"JB Hong","year":"2017","unstructured":"Hong, J.B., Kim, D.S., Chung, C.J., Huang, D.: A survey on the usability and practical applications of graphical security models. Comput. Sci. Rev. 26, 1\u201316 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Johnson, P., Lagerstr\u00f6m, R., Ekstedt, M.: A meta language for threat modeling and attack simulations. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, p. 38. ACM (2018)","DOI":"10.1145\/3230833.3232799"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Johnson, P., Vernotte, A., Ekstedt, M., Lagerstr\u00f6m, R.: pwnPr3d: an attack-graph-driven probabilistic threat-modeling approach. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 278\u2013283 (2016)","DOI":"10.1109\/ARES.2016.77"},{"key":"9_CR8","first-page":"27","volume":"29","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K.: A taxonomy for attack graph generation and usage in network security. J. Inf. Secur. Appl. 29, 27\u201356 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11909033_20","volume-title":"Communications and Multimedia Security","author":"I Kotenko","year":"2006","unstructured":"Kotenko, I., Stepashkin, M.: Attack graph based evaluation of network security. In: Leitold, H., Markatos, E.P. (eds.) CMS 2006. LNCS, vol. 4237, pp. 216\u2013227. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11909033_20"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-46263-9_7","volume-title":"Graphical Models for Security","author":"E Li","year":"2016","unstructured":"Li, E., Barendse, J., Brodbeck, F., Tanner, A.: From A to Z: developing a visual vocabulary for information security threat visualisation. In: Kordy, B., Ekstedt, M., Kim, D.S. (eds.) GraMSec 2016. LNCS, vol. 9987, pp. 102\u2013118. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-46263-9_7"},{"key":"9_CR11","unstructured":"Mao, X.: Visualization and natural language representation of simulated cyber attacks. Master\u2019s thesis, KTH Royal Institute of Technology (2018)"},{"key":"9_CR12","unstructured":"MITRE. About ATT&CK (2018). \nhttps:\/\/attack.mitre.org\/\n\n. Accessed 01 Apr 2019"},{"key":"9_CR13","unstructured":"MITRE. About CAPEC (2018). \nhttps:\/\/capec.mitre.org\/about\/index.html\n\n. Accessed 25 Mar 2019"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Noel, S., Harley, E., Tam, K.H., Limiero, M., Share, M.: Chapter 4 - cygraph: graph-based analytics and visualization for cybersecurity. In: Cognitive Computing: Theory and Applications, volume 35 of Handbook of Statistics, pp. 117\u2013167. Elsevier (2016)","DOI":"10.1016\/bs.host.2016.07.001"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 109\u2013118. ACM (2004)","DOI":"10.1145\/1029208.1029225"},{"issue":"3","key":"9_CR16","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/JSYST.2012.2221853","volume":"7","author":"T Sommestad","year":"2013","unstructured":"Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363\u2013373 (2013)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Computer Science","Graphical Models for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36537-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T23:49:45Z","timestamp":1574812185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36537-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030365363","9783030365370"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36537-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GraMSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Graphical Models for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hoboken, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gramsec2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/gramsec.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}