{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T21:35:00Z","timestamp":1771968900392,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030891367","type":"print"},{"value":"9783030891374","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89137-4_12","type":"book-chapter","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T22:42:46Z","timestamp":1633905766000},"page":"171-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3201-7793","authenticated-orcid":false,"given":"Isaac","family":"Matthews","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1922-6678","authenticated-orcid":false,"given":"Sadegh","family":"Soudjani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7233-6943","authenticated-orcid":false,"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,10]]},"reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/s10669-013-9463-4","volume":"33","author":"F Baiardi","year":"2013","unstructured":"Baiardi, F., Sgandurra, D.: Assessing ICT risk through a Monte Carlo method. Environ. Syst. Decis. 33(4), 486\u2013499 (2013). https:\/\/doi.org\/10.1007\/s10669-013-9463-4","journal-title":"Environ. Syst. Decis."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-66505-4_2","volume-title":"Network Security Metrics","author":"P Cheng","year":"2017","unstructured":"Cheng, P., Wang, L., Jajodia, S., Singhal, A.: Refining CVSS-based network security metrics by examining the base scores. In: Network Security Metrics, pp. 25\u201352. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66505-4_2"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Doynikova, E., Kotenko, I.: Enhancement of probabilistic attack graphs for accurate cyber security monitoring. In: IEEE SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI, pp. 1\u20136 (2017)","DOI":"10.1109\/UIC-ATC.2017.8397618"},{"key":"12_CR4","unstructured":"FIRST: Common vulnerability scoring system v3.1: Specification document (2019). https:\/\/www.first.org\/cvss\/v3.1\/specification-document"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-66505-4_1","volume-title":"Network Security Metrics","author":"M Frigault","year":"2017","unstructured":"Frigault, M., Wang, L., Jajodia, S., Singhal, A.: Measuring the overall network security by combining CVSS scores based on attack graphs and Bayesian networks. In: Network Security Metrics, pp. 1\u201323. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66505-4_1"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Fung, R., Del Favero, B.: Backward simulation in Bayesian networks. In: Uncertainty Proceedings 1994, pp. 227\u2013234. Elsevier (1994)","DOI":"10.1016\/B978-1-55860-332-5.50034-1"},{"key":"12_CR7","unstructured":"Greenbone: OpenVAS (2006). https:\/\/www.openvas.org\/"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3233\/JCS-130475","volume":"21","author":"J Homer","year":"2013","unstructured":"Homer, J., et al.: Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 21(4), 561\u2013597 (2013)","journal-title":"J. Comput. Secur."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Keramati, M., Keramati, M.: Novel security metrics for ranking vulnerabilities in computer networks. In: 7th IST, pp. 883\u2013888 (2014)","DOI":"10.1109\/ISTEL.2014.7000828"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Matthews, I., Mace, J., Soudjani, S., van Moorsel, A.: Cyclic bayesian attack graphs: a systematic computational approach. In: IEEE 19th TrustCom (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00030","DOI":"10.1109\/TrustCom50675.2020.00030"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TDSC.2016.2627033","volume":"16","author":"L Mu\u00f1oz-Gonz\u00e1lez","year":"2016","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., Sgandurra, D., Barrere, M., Lupu, E.: Exact inference techniques for the analysis of Bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 16, 231\u2013244 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., Sgandurra, D., Paudice, A., Lupu, E.C.: Efficient attack graph analysis through approximate inference. CoRR abs\/1606.07025 (2017)","DOI":"10.1145\/3105760"},{"key":"12_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68282-2","volume-title":"Bayesian Networks and Decision Graphs","author":"TD Nielsen","year":"2009","unstructured":"Nielsen, T.D., Jensen, F.V.: Bayesian Networks and Decision Graphs. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-0-387-68282-2"},{"issue":"1","key":"12_CR14","first-page":"135","volume":"1","author":"S Noel","year":"2010","unstructured":"Noel, S., Jajodia, S., Wang, L., Singhal, A.: Measuring security risk of networks using attack graphs. Int. J. Next-Gener. Comput. 1(1), 135\u2013147 (2010)","journal-title":"Int. J. Next-Gener. Comput."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: 13th ACM CCS, pp. 336\u2013345. ACM, New York (2006)","DOI":"10.1145\/1180405.1180446"},{"key":"12_CR16","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: Proceedings of the 14th Conference on USENIX Security Symposium, SSYM\u201905, vol. 14, p. 8. USENIX Association, Berkeley (2005)"},{"key":"12_CR17","series-title":"Springer Briefs in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-1-4614-1860-3_2","volume-title":"Quantitative Security Risk Assessment of Enterprise Networks","author":"X Ou","year":"2011","unstructured":"Ou, X., Singhal, A.: Attack graph techniques. In: Ou, X., Singhal, A. (eds.) Quantitative Security Risk Assessment of Enterprise Networks. Springer Briefs in Computer Science, pp. 5\u20138. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-1860-3_2"},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2012","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61\u201374 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901, vol. 2, pp. 307\u2013321 (2001)","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"12_CR20","unstructured":"Tenable: Nessus vulnerability scanner (1998). https:\/\/www.tenable.com\/products\/nessus\/nessus-professional\/"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89137-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:50:55Z","timestamp":1725904255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89137-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030891367","9783030891374"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89137-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}