{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:37:51Z","timestamp":1742920671883,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031479625"},{"type":"electronic","value":"9783031479632"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47963-2_5","type":"book-chapter","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T21:41:26Z","timestamp":1700689286000},"page":"55-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning Attack Trees by\u00a0Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Florian","family":"Dorfhuber","sequence":"first","affiliation":[]},{"given":"Julia","family":"Eisentraut","sequence":"additional","affiliation":[]},{"given":"Jan","family":"K\u0159et\u00ednsk\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,23]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Jalil, K.A., Kamarudin, M.H., Masrek, M.N.: Comparison of machine learning algorithms performance in detecting network intrusion. In: 2010 International Conference on Networking and Information Technology, pp. 221\u2013226. IEEE (2010)","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Alhomidi, M., Reed, M.: Finding the minimum cut set in attack graphs using genetic algorithms. In: 2013 International Conference on Computer Applications Technology (ICCAT), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICCAT.2013.6522000"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Andr\u00e9, \u00c9., et al.: Parametric analyses of attack-fault trees. In: 2019 19th International Conference on Application of Concurrency to System Design (ACSD), pp. 33\u201342. IEEE (2019)","DOI":"10.1109\/ACSD.2019.00008"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bates, D., et al.: Fitting linear mixed-effects models using lme4 (2014)","DOI":"10.18637\/jss.v067.i01"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-41702-4_10","volume-title":"Information Security Theory and Practice","author":"J Bryans","year":"2020","unstructured":"Bryans, J., et al.: A template-based method for the generation of attack trees. In: Laurent, M., Giannetsos, T. (eds.) WISTP 2019. LNCS, vol. 12024, pp. 155\u2013165. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41702-4_10"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Budde, C.E., Bucur, D., Verkuil, B.: Automated fault tree learning from continuous-valued sensor data. Int. J. Prognostics Health Manag. 13(2) (2022). https:\/\/doi.org\/10.36001\/ijphm.2022.v13i2.3160. ISSN 2153-2648","DOI":"10.36001\/ijphm.2022.v13i2.3160"},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101630","volume":"88","author":"A Buldas","year":"2020","unstructured":"Buldas, A., et al.: Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88, 101630 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR8","unstructured":"Chawla, N.V.: C4. 5 and imbalanced data sets: investigating the effect of sampling method, probabilistic estimate, and decision tree structure. In: Proceedings of the ICML, Toronto, ON, Canada, vol. 3, p. 66. CIBC (2003)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-36537-0_6","volume-title":"Graphical Models for Security","author":"B Fila","year":"2019","unstructured":"Fila, B., Wide\u0142, W.: Attack\u2013defense trees for abusing optical power meters: a case study and the OSEAD tool experience report. In: Albanese, M., Horne, R., Probst, C.W. (eds.) GraMSec 2019. LNCS, vol. 11720, pp. 95\u2013125. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36537-0_6"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-74860-3_9","volume-title":"Graphical Models for Security","author":"O Gadyatskaya","year":"2018","unstructured":"Gadyatskaya, O., Trujillo-Rasua, R.: New directions in attack tree research: catching up with industrial needs. In: Liu, P., Mauw, S., St\u00f8len, K. (eds.) GraMSec 2017. LNCS, vol. 10744, pp. 115\u2013126. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74860-3_9"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-43425-4_10","volume-title":"Quantitative Evaluation of Systems","author":"O Gadyatskaya","year":"2016","unstructured":"Gadyatskaya, O., et al.: Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In: Agha, G., Van Houdt, B. (eds.) QEST 2016. LNCS, vol. 9826, pp. 159\u2013162. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43425-4_10"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, E.C., Freitas, A.A., Plastino, A.: A survey of genetic algorithms for multi-label classification. In: 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20138 (2018)","DOI":"10.1109\/CEC.2018.8477927"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1016\/j.dss.2004.06.004","volume":"41","author":"M Gupta","year":"2006","unstructured":"Gupta, M., et al.: Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis. Support Syst. 41(3), 592\u2013603 (2006)","journal-title":"Decis. Support Syst."},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-662-49635-0_9","volume-title":"Principles of Security and Trust","author":"H Hermanns","year":"2016","unstructured":"Hermanns, H., et al.: The value of attack-defence diagrams. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 163\u2013185. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49635-0_9"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Hong, J.B., Kim, D.S., Takaoka, T.: Scalable attack representation model using logic reduction techniques. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 404\u2013411. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.51"},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387","volume-title":"Applied Logistic Regression","author":"DW Hosmer Jr","year":"2013","unstructured":"Hosmer, D.W., Jr., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. Wiley, Hoboken (2013)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-319-24018-3_16","volume-title":"Information Security Theory and Practice","author":"MG Ivanova","year":"2015","unstructured":"Ivanova, M.G., et al.: Attack tree generation by policy invalidation. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 249\u2013259. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24018-3_16"},{"key":"5_CR18","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-18467-8_23","volume-title":"ICT Systems Security and Privacy Protection","author":"R Jhawar","year":"2015","unstructured":"Jhawar, R., et al.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 339\u2013353. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_23"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-030-01141-3_6","volume-title":"Security and Trust Management","author":"R Jhawar","year":"2018","unstructured":"Jhawar, R., et al.: Semi-automatically augmenting attack trees using an annotated attack tree library. In: Katsikas, S.K., Alcaraz, C. (eds.) STM 2018. LNCS, vol. 11091, pp. 85\u2013101. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01141-3_6"},{"issue":"4","key":"5_CR20","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1109\/tdsc.2022.3203805","volume":"20","author":"LA Jimenez-Roa","year":"2023","unstructured":"Jimenez-Roa, L.A., et al.: Automatic inference of fault tree models via multi-objective evolutionary algorithms. IEEE Trans. Dependable Secure Comput. 20(4), 3317\u20133327 (2023). https:\/\/doi.org\/10.1109\/tdsc.2022.3203805. ISSN 1545-5971","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-12827-1_5","volume-title":"Information Security, Practice and Experience","author":"A J\u00fcrgenson","year":"2010","unstructured":"J\u00fcrgenson, A., Willemson, J.: On fast and approximate attack tree computations. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 56\u201366. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12827-1_5"},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01145-7","volume":"20","author":"D Kim","year":"2020","unstructured":"Kim, D., Choi, J., Han, K.: Risk management-based security evaluation model for telemedicine systems. BMC Med. Inform. Decis. Mak. 20(1), 1\u201314 (2020)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"5_CR23","unstructured":"Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modeling: don\u2019t miss the forest for the attack trees. CoRR, abs\/1303.7397 (2013). http:\/\/arxiv.org\/abs\/1303.7397"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy, B., et al.: Foundations of attack-defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80\u201395. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_6 ISBN 978-3-642-19750-5"},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Kumar, R., Stoelinga, M.: Quantitative security and safety analysis with attack-fault trees. In: High Assurance Systems Engineering (HASE), pp. 25\u201332 (2017). https:\/\/doi.org\/10.1109\/HASE.2017.12","DOI":"10.1109\/HASE.2017.12"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-11599-3_12","volume-title":"Secure IT Systems","author":"A Lenin","year":"2014","unstructured":"Lenin, A., Willemson, J., Sari, D.P.: Attacker profiling in quantitative security assessment based on attack trees. In: Bernsmed, K., Fischer-H\u00fcbner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 199\u2013212. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11599-3_12"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-35540-1_2","volume-title":"Dependable Software Engineering. Theories, Tools, and Applications","author":"A Linard","year":"2019","unstructured":"Linard, A., Bucur, D., Stoelinga, M.: Fault trees from data: efficient learning with an evolutionary algorithm. In: Guan, N., Katoen, J.-P., Sun, J. (eds.) SETTA 2019. LNCS, vol. 11951, pp. 19\u201337. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35540-1_2"},{"issue":"3","key":"5_CR28","first-page":"233","volume":"5","author":"PG Majeed","year":"2014","unstructured":"Majeed, P.G., Kumar, S.: Genetic algorithms in intrusion detection systems: a survey. Int. J. Innov. Appl. Stud. 5(3), 233 (2014)","journal-title":"Int. J. Innov. Appl. Stud."},{"key":"5_CR29","unstructured":"RTO NATO. Improving common security risk analysis. Technical report, RTO Technical Report TR-IST-049, Research and Technology Organisation of NATO (2008)"},{"issue":"2","key":"5_CR30","first-page":"730","volume":"6","author":"SN Pawar","year":"2013","unstructured":"Pawar, S.N.: Intrusion detection in computer network using genetic algorithm approach: a survey. Int. J. Adv. Eng. Technol. 6(2), 730 (2013)","journal-title":"Int. J. Adv. Eng. Technol."},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-29968-6_7","volume-title":"Graphical Models for Security","author":"S Pinchinat","year":"2016","unstructured":"Pinchinat, S., Acher, M., Vojtisek, D.: ATSyRa: an integrated environment for synthesizing attack trees. In: Mauw, S., Kordy, B., Jajodia, S. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 97\u2013101. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29968-6_7"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-319-15201-1_24","volume-title":"Software Engineering and Formal Methods","author":"S Pinchinat","year":"2015","unstructured":"Pinchinat, S., Acher, M., Vojtisek, D.: Towards synthesis of attack trees for supporting computer-aided risk analysis. In: Canal, C., Idani, A. (eds.) SEFM 2014. LNCS, vol. 8938, pp. 363\u2013375. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15201-1_24"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-030-62230-5_2","volume-title":"Graphical Models for Security","author":"S Pinchinat","year":"2020","unstructured":"Pinchinat, S., Schwarzentruber, F., L\u00ea Cong, S.: Library-based attack tree synthesis. In: Eades III, H., Gadyatskaya, O. (eds.) GraMSec 2020. LNCS, vol. 12419, pp. 24\u201344. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62230-5_2"},{"key":"5_CR34","first-page":"94","volume":"27","author":"JLH Ramos","year":"2020","unstructured":"Ramos, J.L.H., Skarmeta, A.: Assessing vulnerabilities in IoT-based ambient assisted living systems. Secur. Privacy Internet Things Challenges Solutions 27, 94 (2020)","journal-title":"Secur. Privacy Internet Things Challenges Solutions"},{"issue":"19","key":"5_CR35","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3991\/ijet.v15i19.12699","volume":"15","author":"Y Rosmansyah","year":"2020","unstructured":"Rosmansyah, Y., Hendarto, I., Pratama, D.: Impersonation attack-defense tree. Int. J. Emerg. Technol. Learn. (iJET) 15(19), 239\u2013246 (2020)","journal-title":"Int. J. Emerg. Technol. Learn. (iJET)"},{"key":"5_CR36","volume-title":"Secrets & Lies: Digital Security in a Networked World","author":"B Schneier","year":"2000","unstructured":"Schneier, B.: Secrets & Lies: Digital Security in a Networked World, 1st edn. Wiley, New York (2000). ISBN 0471253111","edition":"1"},{"key":"5_CR37","unstructured":"Sheyner, O., et al.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, Washington, DC, USA, p. 273. IEEE Computer Society (2002). http:\/\/dl.acm.org\/citation.cfm?id=829514.830526. ISBN 0-7695-1543-6"},{"key":"5_CR38","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Nielson, H.R.: Automated generation of attack trees. In: 2014 IEEE 27th Computer Security Foundations Symposium, pp. 337\u2013350. IEEE (2014)","DOI":"10.1109\/CSF.2014.31"},{"issue":"4","key":"5_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331524","volume":"52","author":"W Widel","year":"2019","unstructured":"Widel, W., et al.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. (CSUR) 52(4), 1\u201336 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47963-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T19:48:11Z","timestamp":1730576891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47963-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031479625","9783031479632"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47963-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Theoretical Aspects of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictac2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictac2023.compsust.utec.edu.pe\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}