{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:37:31Z","timestamp":1767137851367,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319070759","type":"print"},{"value":"9783319070766","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07076-6_3","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:42:43Z","timestamp":1404870163000},"page":"38-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Risk Analysis by Logic Programming"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Zech","sequence":"first","affiliation":[]},{"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[]},{"given":"Ruth","family":"Breu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,10]]},"reference":[{"key":"3_CR1","volume-title":"Managing Information Security Risks: The OCTAVE Approach","author":"CJ Alberts","year":"2002","unstructured":"Alberts, C.J., Dorofee, A.: Managing Information Security Risks: The OCTAVE Approach. Addison-Wesley Longman Publishing Co. Inc., Chichester (2002)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Almorsy, M., Grundy, J., Ibrahim, A.S.: Supporting automated vulnerability analysis using formalized vulnerability signatures. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 100\u2013109. ACM (2012)","DOI":"10.1145\/2351676.2351691"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"23","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 23, 287\u2013295 (2000)","journal-title":"J. Syst. Softw."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-14309-0_8","volume-title":"A 25-Year Perspective on Logic Programming","author":"P Bonatti","year":"2010","unstructured":"Bonatti, P., Calimeri, F., Leone, N., Ricca, F.: Answer set programming. In: Dovier, A., Pontelli, E. (eds.) 25 Years of Logic Programming. LNCS, vol. 6125, pp. 159\u2013182. Springer, Heidelberg (2010)"},{"issue":"7","key":"3_CR5","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1145\/368273.368557","volume":"5","author":"M Davis","year":"1962","unstructured":"Davis, M., Logemann, G., Loveland, D.: A machine program for theorem-proving. Commun. ACM 5(7), 394\u2013397 (1962)","journal-title":"Commun. ACM"},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/321033.321034","volume":"7","author":"M Davis","year":"1960","unstructured":"Davis, M., Putnam, H.: A computing procedure for quantification theory. J. ACM (JACM) 7(3), 201\u2013215 (1960)","journal-title":"J. ACM (JACM)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Dimitrakos, T., Raptis, D., Ritchie, B., St\u00f8len, K.: Model-based security risk analysis for web applications: the coras approach. In: Proceedings of the EuroWeb, Citeseer (2002)","DOI":"10.14236\/ewic\/EW2002.6"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/978-3-642-03754-2_2","volume-title":"Reasoning Web","author":"T Eiter","year":"2009","unstructured":"Eiter, T., Ianni, G., Krennwallner, T.: Answer set programming: a primer. In: Tessaris, S., Franconi, E., Eiter, T., Gutierrez, C., Handschuh, S., Rousset, M.-C., Schmidt, R.A. (eds.) Reasoning Web 2009. LNCS, vol. 5689, pp. 40\u2013110. Springer, Heidelberg (2009)"},{"key":"3_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality","author":"M Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol. 94, pp. 159\u2013180. Springer, Heidelberg (2012)"},{"key":"3_CR10","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proceedings of the 5th International Conference on Logic Programming, vol. 161 (1988)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats, pp. 247\u2013266. Springer, Heidelberg (2005)"},{"issue":"2","key":"3_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2004.07.004","volume":"24","author":"B Karabacak","year":"2005","unstructured":"Karabacak, B., Sogukpinar, I.: Isram: information security risk analysis method. Comput. Secur. 24(2), 147\u2013159 (2005)","journal-title":"Comput. Secur."},{"key":"3_CR13","unstructured":"R. Kowalski. Predicate logic as programming language. Edinburgh University (1973)"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1145\/1149114.1149117","volume":"7","author":"N Leone","year":"2006","unstructured":"Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., Scarcello, F.: The dlv system for knowledge representation and reasoning. ACM Trans. Comput. Logic (TOCL) 7(3), 499\u2013562 (2006)","journal-title":"ACM Trans. Comput. Logic (TOCL)"},{"key":"3_CR15","unstructured":"Lifschitz, V.: What is answer set programming. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 1594\u20131597 (2008)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., Cunningham, R.:. Validating and restoring defense in depth using attack graphs. In: Military Communications Conference, 2006, MILCOM 2006, pp. 1\u201310. IEEE (2006)","DOI":"10.1109\/MILCOM.2006.302434"},{"issue":"5","key":"3_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2004.84","volume":"2","author":"G McGraw","year":"2004","unstructured":"McGraw, G., Potter, B.: Software security testing. IEEE Secur. Priv. 2(5), 81\u201385 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-04474-8_18","volume-title":"Information Security","author":"S Roschke","year":"2009","unstructured":"Roschke, S., Cheng, F., Schuppenies, R., Meinel, C.: Towards unifying vulnerability information for attack graph construction. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 218\u2013233. Springer, Heidelberg (2009)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-Based Testing (2012)","DOI":"10.1109\/ICST.2012.180"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07076-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T22:45:53Z","timestamp":1703198753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07076-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070759","9783319070766"],"references-count":19,"aliases":["10.1007\/978-3-319-14114-5_3"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07076-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}