{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:50Z","timestamp":1748664770286,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319250151"},{"type":"electronic","value":"9783319250175"}],"license":[{"start":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T00:00:00Z","timestamp":1445126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-25017-5_41","type":"book-chapter","created":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T23:39:25Z","timestamp":1445211565000},"page":"439-449","source":"Crossref","is-referenced-by-count":2,"title":["Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems"],"prefix":"10.1007","author":[{"given":"Ricardo J.","family":"Rodr\u00edguez","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Marrone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,18]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Stubblebine, S.: Software engineering for security: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering, ICSE\u201900, New York, pp. 227\u2013239. ACM (2000)","DOI":"10.1145\/336512.336559"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, R.J., Trubiani, C., Merseguer, J.: Fault-tolerant techniques and security mechanisms for model-based performance prediction of critical systems. In: Proceedings of the 3rd ISARCS, pp. 21\u201330. ACM (2012)","DOI":"10.1145\/2304656.2304660"},{"key":"41_CR3","unstructured":"de Lemos, R., et al.: Software engineering for self-adaptive systems: a second research roadmap. Software Engineering for Self-adaptive Systems II. Volume 7475 of Lecture Notes in Computer Science, pp. 1\u201332. Springer, Berlin (2013)"},{"key":"41_CR4","unstructured":"NIPP 2013-Partnering for Critical Infrastructure Security and Resilience. U.S. D.H.S., Technical report (2013)"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2013.07.053","volume":"87","author":"D Perez-Palacin","year":"2014","unstructured":"Perez-Palacin, D., Mirandola, R., Merseguer, J.: On the relationships between QoS and software adaptability at the architectural level. J. Syst. Softw. 87, 1\u201317 (2014)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"41_CR6","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1111\/j.1467-8640.1989.tb00324.x","volume":"5","author":"T Dean","year":"1989","unstructured":"Dean, T., Kanazawa, K.: A model for reasoning about persistence and causation. Comput. Intell. 5(2), 142\u2013150 (1989)","journal-title":"Comput. Intell."},{"key":"41_CR7","unstructured":"Macdonald, D., Clements, S., Patrick, S., Perkins, C., Muller, G., Lancaster, M., Hutton, W.: Cyber\/physical security vulnerability assessment integration. In: Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES., February 2013, pp. 1\u20136"},{"key":"41_CR8","unstructured":"Garcia, M.L.: Vulnerability Assessment of Physical Protection Systems, 1st edn. Butterworth-Heinemann (2005)"},{"key":"41_CR9","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"Sjouke Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Information Security and Cryptology\u2013ICISC 2005, 8th International Conference, Seoul, Korea, 1\u20132 December 2005, pp. 186\u2013198, Revised Selected Papers (2005)"},{"issue":"2","key":"41_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1080\/13623079.2011.587206","volume":"24","author":"S Bistarelli","year":"2012","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P., Santini, F.: Evaluation of complex security scenarios using defense trees and economic indexes. J. Exp. Theor. Artif. Intell. 24(2), 161\u2013192 (2012)","journal-title":"J. Exp. Theor. Artif. Intell."},{"issue":"2","key":"41_CR11","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TPDS.2013.211","volume":"25","author":"SA Zonouz","year":"2014","unstructured":"Zonouz, S.A., Khurana, H., Sanders, W.H., Yardley, T.M.: RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans. Parallel Distrib. Syst. 25(2), 395\u2013406 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"41_CR12","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1504\/IJHPCN.2013.056525","volume":"7","author":"Massimo Ficco","year":"2013","unstructured":"Ficco, M.: Security event correlation approach for cloud computing. Int. J. High Perform. Comput. Netw. 7(3), 173\u2013185 (2013). September","journal-title":"International Journal of High Performance Computing and Networking"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: Petri net modelling of physical vulnerability. Critical Information Infrastructure Security. Volume 6983 of LNCS, pp. 128\u2013139. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-41476-3_11"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Xie, P., Li, J.H., Ou, X., Liu, P., Levy, R.: Using Bayesian networks for cyber security analysis. In: 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), June 2010, pp. 211\u2013220","DOI":"10.1109\/DSN.2010.5544924"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP\u201908, New York, pp. 23\u201330. ACM (2008)","DOI":"10.1145\/1456362.1456368"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Tang, K., Zhou, M.T., Wang, W.Y.: Insider cyber threat situational awareness framwork using dynamic Bayesian networks. In: Proceedings of the 4th International Conference on Computer Science Education (ICCSE), pp. 1146\u20131150, July 2009","DOI":"10.1109\/ICCSE.2009.5228485"},{"key":"41_CR17","unstructured":"OMG: Unified Modelling Language: Superstructure. Object Management Group, August 2011. Version 2.4, formal\/11-08-05"},{"issue":"1","key":"41_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0169-023X(94)90006-X","volume":"14","author":"S Chakravarthy","year":"1994","unstructured":"Chakravarthy, S., Mishra, D.: Snoop: an expressive event specification language for active databases. Data Knowl. Eng. 14(1), 1\u201326 (1994)","journal-title":"Data Knowl. Eng."},{"key":"41_CR19","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/978-3-642-40588-4_31","volume-title":"Security Engineering and Intelligence Informatics","author":"Francesco Flammini","year":"2013","unstructured":"Flammini, F., Marrone, S., Mazzocca, N., Pappalardo, A., Pragliola, C., Vittorini, V.: Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenarios. In: Security Engineering and Intelligence Informatics. Volume 8128 of Lecture Notes in Computer Science, pp. 442\u2013456 (2013)"},{"issue":"4","key":"41_CR20","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.diin.2005.11.007","volume":"2","author":"Eoghan Casey","year":"2005","unstructured":"Casey, E.: Case study: network intrusion investigation\u2014lessons in forensic preparation. Digit. Investig. 2(4), 254\u2013260 (2005)","journal-title":"Digital Investigation"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25017-5_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:10:46Z","timestamp":1748657446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25017-5_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,18]]},"ISBN":["9783319250151","9783319250175"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25017-5_41","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,10,18]]}}}