{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:01:16Z","timestamp":1742954476140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_39","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"427-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of Information Systems Based on Attack Sequences Generation and Testing"],"prefix":"10.1007","author":[{"given":"Roman","family":"Kryukov","sequence":"first","affiliation":[]},{"given":"Elena","family":"Doynikova","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"39_CR1","unstructured":"First website. common vulnerability scoring system. https:\/\/www.first.org\/cvss\/"},{"key":"39_CR2","unstructured":"Github website. atomic red team tests. https:\/\/github.com\/redcanaryco\/atomic-red-team"},{"key":"39_CR3","unstructured":"Github website. MITRE CALDERA. https:\/\/github.com\/mitre\/caldera"},{"key":"39_CR4","unstructured":"Github website. MITRE CASCADE. https:\/\/github.com\/mitre\/cascade-server"},{"key":"39_CR5","unstructured":"MITRE website. MITRE ATT&CK enterprise matrix. https:\/\/attack.mitre.org\/matrices\/enterprise\/"},{"key":"39_CR6","unstructured":"Mitre website. MITRE cyber analytics repository. https:\/\/car.mitre.org\/"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Artz, M.: Netspa, a network security planning architecture. Master\u2019s thesis (2002)","DOI":"10.1016\/S1353-4858(02)12001-0"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Dantu, R., Kolan, P., C.\u00a0J.: Network risk management using attacker profiling. Sec. Commun. Netw. 2(1), 83\u201396 (2009)","DOI":"10.1002\/sec.58"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Feigenbaum, E.: The art of artificial intelligence: Themes and case studies of knowledge engineering. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp. 1014\u20131029 (1977)","DOI":"10.21236\/ADA046289"},{"key":"39_CR10","unstructured":"Frigault, M., Wang, L., Jajodia, S., Singhal, A.: Network Security Metrics (2017)"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Proceedings of 22nd Annual Conference on the Computer Security Applications, Miami Beach, FL, pp. 121\u2013130. IEEE (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Khosravi-Farmad, M., Ghaemi-Bafghi, A.: Bayesian decision network-based security risk management framework. J. Netw. Syst. Manag. 1\u201326 (2020)","DOI":"10.1007\/s10922-020-09558-5"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Doynikova, E.: Security assessment of computer networks based on attack graphs and security events. In: L.\u00a0et\u00a0al. (ed.) ICT-EurAsia 2014, Lecture Notes in Computer Science (LNCS), vol. 8407, pp. 462\u2013471. Springer (2014)","DOI":"10.1007\/978-3-642-55032-4_47"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Doynikova, E.: The CAPEC based generator of attack scenarios for network security evaluation. In: Proceedings of the IEEE 8th International Conference on \u201cIntelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS\u20192015), pp. 436\u2013441 (2015)","DOI":"10.1109\/IDAACS.2015.7340774"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Ingols, K. et\u00a0al.: Validating and restoring defense in depth using attack graphs. In: Proceedings of the MILCOM 2006, Washington, DC, pp. 1014\u20131029 (2006)","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"39_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1117\/12.604240","volume":"5812","author":"Y Liu","year":"2005","unstructured":"Liu, Y., Man, H.: Network vulnerability assessment using bayesian networks. Proc. SPIE 5812, 61\u201371 (2005)","journal-title":"Proc. SPIE"},{"key":"39_CR17","unstructured":"MITRE. CAPEC database. https:\/\/capec.mitre.org\/"},{"key":"39_CR18","unstructured":"MITRE. MITRE att&ck database. https:\/\/attack.mitre.org\/"},{"key":"39_CR19","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TDSC.2016.2627033","volume":"16","author":"L Mu\u00f1oz-Gonz\u00e1lez","year":"2019","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., Sgandurra, D., Barr\u00e8re, M., Lupu, E.: Dynamic security risk management using bayesian attack graphsexact inference techniques for the analysis of bayesian attack graphs. IEEE Trans. Depend. Sec. Comput. 16, 231\u2013244 (2019)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"39_CR20","volume-title":"Production Systems: Models of Control Structures","author":"A Newell","year":"1973","unstructured":"Newell, A.: Production Systems: Models of Control Structures. Academic, New York, NY (1973)"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Poolsappasit, N., Dewri, R., R.\u00a0I.: Dynamic security risk management using bayesian attack graphs. IEEE Trans. Depend. Sec. Comput. 9(1), 61\u201374 (2012)","DOI":"10.1109\/TDSC.2011.34"},{"key":"39_CR22","doi-asserted-by":"crossref","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. NIST interagency report (2011)","DOI":"10.6028\/NIST.IR.7788"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Stakhanova, N., Basu, S., W.\u00a0J.: A cost-sensitive model for preemptive intrusion response systems. In: Proceedings of the 21st International Conference on Advanced Networking and Applications (2007)","DOI":"10.1109\/AINA.2007.9"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:26:49Z","timestamp":1651840009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_39","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}