{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:52:20Z","timestamp":1771026740928,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319170152","type":"print"},{"value":"9783319170169","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_13","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"201-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers"],"prefix":"10.1007","author":[{"given":"Wolter","family":"Pieters","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Davarynejad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-54792-8_16","volume-title":"Principles of Security and Trust","author":"F Arnold","year":"2014","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 285\u2013305. Springer, Heidelberg (2014)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Arnold, F., Pieters, W., Stoelinga, M.I.A.: Quantitative penetration testing with item response theory. In: 2013 Proceedings of Information Assurance and Security (IAS). IEEE (2013)","DOI":"10.1109\/ISIAS.2013.6947732"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: 2006 The First International Conference on Availability, Reliability and Security, ARES 2006 (2006)","DOI":"10.1109\/ARES.2006.46"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11962977_19","volume-title":"Critical Information Infrastructures Security","author":"A Buldas","year":"2006","unstructured":"Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J.: Rational choice of security measures via multi-parameter attack trees. In: L\u00f3pez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 235\u2013248. Springer, Heidelberg (2006)"},{"issue":"8","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1111\/j.1539-6924.2009.01247.x","volume":"29","author":"LA Cox Jr","year":"2009","unstructured":"Cox Jr, L.A.: Game theory and risk analysis. Risk Anal. 29(8), 1062\u20131068 (2009)","journal-title":"Risk Anal."},{"key":"13_CR6","unstructured":"Cremonini, M., Martini, P.: Evaluating information security investments from attackers perspective: the return-on-attack (ROA). In: 4th Workshop on the Economics on Information Security (2005)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"Quantitative Evaluation of Systems","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173\u2013176. Springer, Heidelberg (2013)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13\u201314","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: DAG-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13\u201314, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"key":"13_CR10","unstructured":"de la Maza, M., Tidor, B.: An analysis of selection procedures with particular attention paid to proportional and Boltzmann selection. In: Proceedings of the 5th International Conference on Genetic Algorithms, pp. 124\u2013131 (1993)"},{"issue":"4","key":"13_CR11","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1103\/PhysRevA.37.1351","volume":"37","author":"JD Nulton","year":"1988","unstructured":"Nulton, J.D., Salamon, P.: Statistical mechanics of combinatorial optimization. Phys. Rev. A 37(4), 1351\u20131356 (1988)","journal-title":"Phys. Rev. A"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Pieters, W.: Defining \u201cthe weakest link\u201d: comparative security in complex systems of systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 2, pp. 39\u201344, December 2013","DOI":"10.1109\/CloudCom.2013.101"},{"issue":"2","key":"13_CR13","first-page":"4","volume":"4","author":"W Pieters","year":"2014","unstructured":"Pieters, W., Lukszo, Z., Had\u017eiosmanovi\u0107, D., Van den Berg, J.: Reconciling malicious and accidental risk in cyber security. J. Internet Serv. Inf. Secur. 4(2), 4\u201326 (2014)","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Pieters, W., Van der Ven, S.H.G., Probst, C.W.: A move in the security measurement stalemate: elo-style ratings to quantify vulnerability. In: Proceedings of the 2012 New Security Paradigms Workshop, NSPW 2012, pp. 1\u201314. ACM (2012)","DOI":"10.1145\/2413296.2413298"},{"issue":"12","key":"13_CR15","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees: modeling security threats. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"13_CR16","unstructured":"The Open Group. Risk taxonomy. Technical report C081, The Open Group (2009)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T09:49:28Z","timestamp":1675849768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}