{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:14:12Z","timestamp":1743102852473,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_29","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"538-555","source":"Crossref","is-referenced-by-count":8,"title":["Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks"],"prefix":"10.1007","author":[{"given":"Gustavo Gonzalez","family":"Granadillo","sequence":"first","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, P., Efrat, A., Ganjugunte, S., Hay, D., Sankararaman, S., Zussman, G.: Network vulnerability to single, multiple and probabilistic physical attacks. In: Military Communications Conference (2010)","DOI":"10.1109\/MILCOM.2010.5679556"},{"key":"29_CR2","unstructured":"Consulting, L.: A Guide for Government Agencies Calculating ROSI. Technical report (2004). \n                    http:\/\/lockstep.com.au\/library\/return_on_investment"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-23951-9_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Fan","year":"2011","unstructured":"Fan, J., Gierlichs, B., Vercauteren, F.: To infinity and beyond: combined attack on ECC using points of low order. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 143\u2013159. Springer, Heidelberg (2011)"},{"key":"29_CR4","unstructured":"Fisher, D.: Microsoft releases attack surface analizer tool (2012). \n                    http:\/\/threatpost.com\/en_us\/blogs\/microsoft-releases-attack-surface-analyzer-tool-080612"},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-013-0207-8","volume":"13","author":"GG Granadillo","year":"2014","unstructured":"Granadillo, G.G., Belhaouane, M., Debar, H., Jacob, G.: RORI-based countermeasure selection using the orbac formalism. International Journal of Information Security 13(1), 63\u201379 (2014)","journal-title":"International Journal of Information Security"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Howard, M., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st Century, pp. 109\u2013137 (2005)","DOI":"10.1007\/0-387-24006-3_8"},{"key":"29_CR7","unstructured":"Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: 8th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-15497-3_38","volume-title":"Computer Security \u2013 ESORICS 2010","author":"N Kheir","year":"2010","unstructured":"Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for cost-sensitive intrusion response. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 626\u2013642. Springer, Heidelberg (2010)"},{"issue":"4","key":"29_CR9","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N Li","year":"2006","unstructured":"Li, N., Tripunitara, M.: Security analysis in role-based access control. ACM Transactions on Information and System Security 9(4), 391\u2013420 (2006)","journal-title":"ACM Transactions on Information and System Security"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Manadhata, P., Wing, J.: An attack surface metric. In: IEEE Transactions on Software Engineering (2010)","DOI":"10.1109\/TSE.2010.60"},{"key":"29_CR11","unstructured":"Northcutt, S.: The attack surface problem. In: SANS technology Institute Document (2011). \n                    http:\/\/www.sans.edu\/research\/security-laboratory\/article\/did-attack-surface"},{"key":"29_CR12","unstructured":"F. of American Scientists: Special operations forces intelligence and electronic warfare operations. Appendix D: Target Analysis Process (1991). \n                    http:\/\/www.fas.org\/irp\/doddir\/army\/fm34-36\/appd.htm"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Petajasoja, S., Kortti, H., Takanen, A., Tirila, J.: Ims threat and attack surface analysis using common vulnerability scoring system. In: 35th IEEE Annual Computer Software and Applications Conference Workshops (2011)","DOI":"10.1109\/COMPSACW.2011.22"},{"key":"29_CR14","unstructured":"Sonnenreich, W., Albanese, J., Stout, B.: Return On Security Investment (rosi) - A Practical Quantitative Model. Journal of Research and Practice in Information Technology 38(1) (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:14:59Z","timestamp":1559373299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}