{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:24Z","timestamp":1747368144044,"version":"3.40.5"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_6","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:04Z","timestamp":1747289584000},"page":"82-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Time is Money: A Temporal Model of\u00a0Cybersecurity"],"prefix":"10.1007","author":[{"given":"Zolt\u00e1n \u00c1d\u00e1m","family":"Mann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Ayed, D., et al.: Protecting sensitive data in the cloud-to-edge continuum: the FogProtect approach. In: 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), pp. 279\u2013288. IEEE (2022)","DOI":"10.1109\/CCGrid54584.2022.00037"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Barrett, C., Tinelli, C.: Satisfiability modulo theories. In: Handbook of model checking, pp. 305\u2013343. Springer (2018)","DOI":"10.1007\/978-3-319-10575-8_11"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Clempner, J.B.: Learning attack-defense response in continuous-time discrete-states Stackelberg Security Markov games. J. Exp. Theoret. Artif. Intell. 36(7), 1239\u20131260 (2024)","DOI":"10.1080\/0952813X.2022.2135615"},{"key":"6_CR4","unstructured":"Farhang, S., Grossklags, J.: When to invest in security? Empirical evidence and a game-theoretic approach for time-based security. In: 16th Annual Workshop on the Economics of Information Security (WEIS) (2017)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Hoffmann, R.: Stochastic model of the simple cyber kill chain: cyber attack process as a regenerative process. In: 19th International Conference on Computer Information Systems and Industrial Management (CISIM), pp. 355\u2013365. Springer (2020)","DOI":"10.1007\/978-3-030-47679-3_30"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/COMST.2018.2871866","volume":"21","author":"M Hus\u00e1k","year":"2018","unstructured":"Hus\u00e1k, M., Kom\u00e1rkov\u00e1, J., Bou-Harb, E., \u010celeda, P.: Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun. Surv. Tutorials 21(1), 640\u2013660 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Keller, C., Mann, Z.\u00c1.: Towards understanding adaptation latency in self-adaptive systems. In: Service-Oriented Computing\u2013ICSOC 2019 Workshops, pp. 42\u201353. Springer (2020)","DOI":"10.1007\/978-3-030-45989-5_4"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Mann, Z.\u00c1.: Urgency in cybersecurity risk management: toward a solid theory. In: IEEE 37th Computer Security Foundations Symposium (CSF), pp. 589\u2013602 (2024)","DOI":"10.1109\/CSF61375.2024.00051"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"70816","DOI":"10.1109\/ACCESS.2021.3078059","volume":"9","author":"Z\u00c1 Mann","year":"2021","unstructured":"Mann, Z.\u00c1., Kunz, F., Laufer, J., Bellendorf, J., Metzger, A., Pohl, K.: RADAR: data protection in cloud-based computer systems at run time. IEEE Access 9, 70816\u201370842 (2021)","journal-title":"IEEE Access"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Merlevede, J., Johnson, B., Grossklags, J., Holvoet, T.: Time-dependent strategies in games of timing. In: 10th International Conference on Decision and Game Theory for Security (GameSec), pp. 310\u2013330. Springer (2019)","DOI":"10.1007\/978-3-030-32430-8_19"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1109\/TDSC.2022.3165624","volume":"20","author":"AV Outkin","year":"2023","unstructured":"Outkin, A.V., Schulz, P.V., Schulz, T., Tarman, T.D., Pinar, A.: Defender policy evaluation and resource allocation with MITRE ATT &CK evaluations data. IEEE Trans. Dependable Secure Comput. 20(3), 1909\u20131926 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Van Dijk","year":"2013","unstructured":"Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of stealthy takeover. J. Cryptol. 26, 655\u2013713 (2013)","journal-title":"J. Cryptol."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Woods, D.W., B\u00f6hme, R.: SoK: Quantifying cyber risk. In: IEEE Symposium on Security and Privacy (SP), pp. 211\u2013228. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00053"},{"issue":"1","key":"6_CR14","first-page":"2031063","volume":"2019","author":"J Zeng","year":"2019","unstructured":"Zeng, J., Wu, S., Chen, Y., Zeng, R., Wu, C.: Survey of attack graph analysis methods from the perspective of data and knowledge processing. Secur. Commun. Netw. 2019(1), 2031063 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"109635","DOI":"10.1016\/j.comnet.2023.109635","volume":"224","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Mi, Y., Liu, X., Zhang, Y., Wang, J., Tan, J.: A differential game approach for real-time security defense decision in scale-free networks. Comput. Netw. 224, 109635 (2023)","journal-title":"Comput. Netw."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Zmiewski, S.S., Laufer, J., Mann, Z.\u00c1.: Automatic online quantification and prioritization of data protection risks. In: 17th International Conference on Availability, Reliability and Security (ARES), art. nr. 7 (2022)","DOI":"10.1145\/3538969.3539005"},{"key":"6_CR17","unstructured":"\u017bychowski, A., Ma\u0144dziuk, J.: Evolution of strategies in sequential security games. In: Proceedings of the 20th AAMAS Conference, pp. 1434\u20131442 (2021)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:12Z","timestamp":1747289592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}