{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:31:51Z","timestamp":1767137511816,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319070759","type":"print"},{"value":"9783319070766","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07076-6_5","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:42:43Z","timestamp":1404870163000},"page":"68-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Graph-Based Approach for Analysis of Software Security"],"prefix":"10.1007","author":[{"given":"Armin","family":"Lunkeit","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,10]]},"reference":[{"key":"5_CR1","volume-title":"Software Security Economics and Threat Modeling based on Attack Path Analysis; A Stakeholder driven approach","author":"Y Chen","year":"2007","unstructured":"Chen, Y.: Software Security Economics and Threat Modeling based on Attack Path Analysis; A Stakeholder driven approach. University of Southern California, Los Angeles (2007)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-04840-1_10","volume-title":"Conceptual Modeling - ER 2009","author":"G Elahi","year":"2009","unstructured":"Elahi, G., Yu, E., Zannone, N.: A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations. In: Laender, A.H.F., Castano, S., Dayal, U., Casati, F., de Oliveira, J.P.M. (eds.) ER 2009. LNCS, vol. 5829, pp. 99\u2013114. Springer, Heidelberg (2009)"},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., Stolen, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer, Heidelberg (2011)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ameedeen, M.A., Dordbar, B.: A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets. School of Computer Science, University of Birmingham, Birmingham B15 2TT, UK (2008)","DOI":"10.1109\/EDOC.2008.42"},{"key":"5_CR5","unstructured":"Sheyner, O., Thesis: Scenario Graphs and Attack Graphs, CMU-CS-04-122. School of Computer Science Department Carnegie Mellon University Pittsburgh, PA, 14 April 2004"},{"key":"5_CR6","unstructured":"Sheyner, O., et al.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 1081\u20136011\/02 (2002)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-30101-1_17","volume-title":"Formal Methods for Components and Objects","author":"O Sheyner","year":"2004","unstructured":"Sheyner, O.: Tools for generating and analyzing attack graphs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 344\u2013371. Springer, Heidelberg (2004)"},{"key":"5_CR8","unstructured":"GraphML - The GraphML File Format. http:\/\/graphml.graphdrawing.org"},{"key":"5_CR9","unstructured":"JUNG - Java Universal Network\/Graph Framework. http:\/\/jung.sourceforge.net"},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.3139\/9783446428539","volume-title":"Graphentheorie","author":"P Tittmann","year":"2011","unstructured":"Tittmann, P.: Graphentheorie. Fachbuchverlag Leipzig, Leipzig (2011)"},{"key":"5_CR11","unstructured":"Common Criteria for Information Technology Evaluation, Part 1: Introduction and general model, September 2012. http:\/\/www.commoncriteriaportal.org\/files\/ccfiles\/CCPART1V3.1R4.pdf"},{"key":"5_CR12","unstructured":"Shostack, A.: Security Briefs: Getting Started With The SDL Threat Modeling Tool, Microsoft Developer Network Magazine, January 2012. http:\/\/msdn.microsoft.com\/en-us\/magazine\/dd347831.aspx"},{"key":"5_CR13","unstructured":"LeBlanc, D.: DREADful, Microsoft Developer Network Blogs, 14 August 2007. http:\/\/blogs.msdn.com\/b\/david_leblanc\/archive\/2007\/08\/13\/dreadful.aspx"},{"key":"5_CR14","unstructured":"Common Vulnerabilities and Exposures Database. http:\/\/cve.mitre.org"},{"key":"5_CR15","unstructured":"Microsoft Portable Executable and Common Object File Format Specification, Revision 8.2, Microsoft, September 2010. http:\/\/www.microsoft.com\/whdc\/system\/platform\/formware\/PECOFF.mspx"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1, 269\u2013271 (1959)","journal-title":"Numer. Math."},{"key":"5_CR17","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)","edition":"2"},{"key":"5_CR18","unstructured":"pefile. http:\/\/code.google.com\/p\/pefile"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07076-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T22:46:01Z","timestamp":1703198761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07076-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070759","9783319070766"],"references-count":18,"aliases":["10.1007\/978-3-319-14114-5_5"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07076-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}