{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:49Z","timestamp":1775470549395,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031893490","type":"print"},{"value":"9783031893506","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-89350-6_9","type":"book-chapter","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T12:08:43Z","timestamp":1745582923000},"page":"141-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Automated Attack Tree Generation Using Artificial Intelligence and Natural Language Processing"],"prefix":"10.1007","author":[{"given":"Alan Birchler","family":"De Allende","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5031-5794","authenticated-orcid":false,"given":"Bastien","family":"Sultan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1167-4639","authenticated-orcid":false,"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-29968-6_3","volume-title":"Graphical Models for Security","author":"L Apvrille","year":"2016","unstructured":"Apvrille, L., Roudier, Y.: SysML-sec attack graphs: compact representations for complex attacks. In: Mauw, S., Kordy, B., Jajodia, S. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 35\u201349. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29968-6_3"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Apvrille, L., Sultan, B.: System architects are not alone anymore: automatic system modeling with AI. In: 12th International Conference on Model-Based Software and Systems Engineering, pp. 27\u201338. SCITEPRESS-Science and Technology Publications (2024). Best paper award","DOI":"10.5220\/0012320100003645"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bakirtzis, G., Carter, B.T., Elks, C.R., Fleming, C.H.: A model-based approach to security analysis for cyber-physical systems. In: 2018 Annual IEEE International Systems Conference (SysCon), pp.\u00a01\u20138. IEEE (2018)","DOI":"10.1109\/SYSCON.2018.8369518"},{"key":"9_CR4","unstructured":"Barnum, S.: Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description. Cigital (2008)"},{"key":"9_CR5","unstructured":"Basel, A., Al-Sheer, E., Singhal, A., Khan, L., Hamlen, K.: Smet: semantic mapping of CVE to ATT &CK and its application to cyber security. No. 13942, DBSec 2023: Data and Applications Security and Privacy XXXVII, Sophia Antopolis, FR (2023)"},{"key":"9_CR6","unstructured":"Bird, S., Klein, E., Loper, E.: Natural language processing with Python: analyzing text with the natural language toolkit. O\u2019Reilly Media, Inc. (2009)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Calvino, A.T., Apvrille, L.: Direct model-checking of SysML models. In: 9th International Conference on Model-Driven Engineering and Software Development, pp. 216\u2013223. SCITEPRESS-Science and Technology Publications (2021)","DOI":"10.5220\/0010256302160223"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Cherdantseva, Y., et al.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404815001388","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"De\u00a0Cat, B., Bogaerts, B., Bruynooghe, M., Janssens, G., Denecker, M.: Predicate logic as a modeling language: the IDP system. In: Declarative Logic Programming: Theory, Systems, and Applications, pp. 279\u2013323 (2018)","DOI":"10.1145\/3191315.3191321"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Edge, K., Raines, R., Grimaila, M., Baldwin, R., Bennington, R., Reuter, C.: The use of attack and protection trees to analyze security for an online banking system. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), pp. 144b\u2013144b. IEEE (2007)","DOI":"10.1109\/HICSS.2007.558"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Glumich, S., Riley, J., Ratazzi, P., Ozanam, A.: BP: integrating cyber vulnerability assessments earlier into the systems development lifecycle. In: 2018 IEEE Secure Development Conference (2018)","DOI":"10.1109\/SecDev.2018.00018"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Combining secure system design with risk assessment for IOT healthcare systems. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 961\u2013966. IEEE (2019)","DOI":"10.1109\/PERCOMW.2019.8730776"},{"key":"9_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103602","volume":"137","author":"AM Konsta","year":"2024","unstructured":"Konsta, A.M., Lafuente, A.L., Spiga, B., Dragoni, N.: Survey: automatic generation of attack trees and attack graphs. Comput. Secur. 137, 103602 (2024)","journal-title":"Comput. Secur."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kumar, R.: An attack tree template based on feature diagram hierarchy. In: 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), pp. 92\u201397. IEEE (2020)","DOI":"10.1109\/DependSys51298.2020.00022"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Lemaire, L., Lapon, J., Decker, B.D., Naessens, V.: A SysML extension for security analysis of industrial control systems. In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014). BCS Learning & Development (2014)","DOI":"10.14236\/ewic\/ics-csr2014.1"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Lugou, F., Li, L.W., Apvrille, L., Ameur-Boulifa, R.: SysML models and model transformation for security. In: 2016 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD), pp. 331\u2013338. IEEE (2016)","DOI":"10.5220\/0005748703310338"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Moore, A., Ellison, R., Linger, R.: Attack modeling for information security and survivability. Technical report CMU\/SEI-2001-TN-001 (2001)","DOI":"10.21236\/ADA387544"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Paul, S.: Towards automating the construction & maintenance of attack trees: a feasibility study. arXiv preprint arXiv:1404.1986 (2014)","DOI":"10.4204\/EPTCS.148.3"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Pedroza, G., Apvrille, L., Knorreck, D.: AVATAR: a SysML environment for the formal verification of safety and security properties. In: 2011 11th Annual International Conference on New Technologies of Distributed Systems, pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/NOTERE.2011.5957992"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-04342-0_4","volume-title":"Recent Advances in Intrusion Detection","author":"M Reh\u00e1k","year":"2009","unstructured":"Reh\u00e1k, M., et al.: Runtime monitoring and dynamic reconfiguration for intrusion detection systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 61\u201380. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04342-0_4"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-bert: sentence embeddings using siamese bert-networks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics (2019)","DOI":"10.18653\/v1\/D19-1410"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Roudier, Y., Apvrille, L.: SysML-Sec: a model driven approach for designing safe and secure systems. In: 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD), pp. 655\u2013664. INSTICC (2015)","DOI":"10.5220\/0005402006550664"},{"issue":"12","key":"9_CR23","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Siddiqi, M.A., Seepers, R.M., Hamad, M., Prevelakis, V., Strydis, C.: Attack-tree-based threat modeling of medical implants. In: PROOFS, pp. 32\u201349 (2018)","DOI":"10.29007\/8gxh"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Sultan, B., Apvrille, L.: AI-driven consistency of SysML diagrams. In: Proceedings of the ACM\/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, MODELS 2024, pp. 149\u2013159. Association for Computing Machinery, New York (2024)","DOI":"10.1145\/3640310.3674079"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Ten, C.W., Liu, C.C., Govindarasu, M.: Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: 2007 IEEE Power Engineering Society General Meeting, pp.\u00a01\u20138. IEEE (2007)","DOI":"10.1109\/PES.2007.385876"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-662-43613-4_12","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"R Vigo","year":"2014","unstructured":"Vigo, R., Nielson, F., Nielson, H.R.: Uniform protection for multi-exposed targets. In: \u00c1brah\u00e1m, E., Palamidessi, C. (eds.) FORTE 2014. LNCS, vol. 8461, pp. 182\u2013198. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43613-4_12"},{"issue":"4","key":"9_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331524","volume":"52","author":"W Wide\u0142","year":"2019","unstructured":"Wide\u0142, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. (CSUR) 52(4), 1\u201336 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-89350-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T12:09:27Z","timestamp":1745582967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-89350-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031893490","9783031893506"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-89350-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aix-en-Provence","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}