{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:22:41Z","timestamp":1761513761925},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319299679"},{"type":"electronic","value":"9783319299686"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29968-6_3","type":"book-chapter","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T06:40:25Z","timestamp":1454654425000},"page":"35-49","source":"Crossref","is-referenced-by-count":10,"title":["SysML-Sec Attack Graphs: Compact Representations for Complex Attacks"],"prefix":"10.1007","author":[{"given":"Ludovic","family":"Apvrille","sequence":"first","affiliation":[]},{"given":"Yves","family":"Roudier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,6]]},"reference":[{"key":"3_CR1","unstructured":"Apvrille, L.: TTool website (2013). \n                    http:\/\/ttool.telecom-paristech.fr\/"},{"key":"3_CR2","unstructured":"Apvrille, L., Roudier, Y.: SysML-sec: a sysML environment for the design and development of secure embedded systems. In: APCOSEC , Asia-Pacific Council on Systems Engineering, 8\u201311 September 2013, Yokohama, Japan. Yokohama, JAPAN (09 2013) (2013). \n                    http:\/\/www.eurecom.fr\/publication\/4186"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-27755-2_3","volume-title":"Lectures on Concurrency and Petri Nets","author":"JE Bengtsson","year":"2004","unstructured":"Bengtsson, J.E., Yi, W.: Timed automata: semantics, algorithms and tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol. 3098, pp. 87\u2013124. Springer, Heidelberg (2004)"},{"issue":"4","key":"3_CR4","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic verification of correspondences for security protocols. J. Comput. Secur. 17(4), 363\u2013434 (2009)","journal-title":"J. Comput. Secur."},{"key":"3_CR5","unstructured":"Dacier, M., Deswarte, Y., Ka\u00e2niche, M.: Information systems security, pp. 177\u2013186. Chapman & Hall Ltd, London, UK (1996). \n                    http:\/\/dl.acm.org\/citation.cfm?id=265514.265530"},{"key":"3_CR6","unstructured":"Dalton, G., Mills, R., Colombi, J., Raines, R.: Analyzing attack trees using generalized stochastic petri nets. In: Information Assurance Workshop, 2006 IEEE, pp. 116\u2013123, June 2006"},{"key":"3_CR7","unstructured":"Fortinet: The Android\/Chuli.A!tr.spy virus, March 2013. \n                    http:\/\/www.fortiguard.com\/encyclopedia\/virus\/#id=4805535"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: ITST, Lille, France (2009)","DOI":"10.1109\/ITST.2009.5399279"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Khand, P.: System level security modeling using attack trees. In: 2nd International Conference on Computer, Control and Communication, 2009. IC4 2009, pp. 1\u20136, February 2009","DOI":"10.1109\/IC4.2009.4909245"},{"key":"3_CR11","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic driven markov processes (bdmp). In: Dependable Computing Conference (EDCC), 2010 European, pp. 199\u2013208, April 2010"},{"issue":"8","key":"3_CR12","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.cose.2009.05.007","volume":"28","author":"S Pudar","year":"2009","unstructured":"Pudar, S., Manimaran, G., Liu, C.C.: Penet: a practical method and tool for integrated modeling of security attacks and countermeasures. Comput. Secur. 28(8), 754\u2013771 (2009). \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404809000522","journal-title":"Comput. Secur."},{"key":"3_CR13","unstructured":"Ruddle, A., et al.: Security Requirements for Automotive On-board Networks Based on Dark-side Scenarios. Technical report. Deliverable D2.3, EVITA Project (2009)"},{"key":"3_CR14","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats, December 1999"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Nielson, H.: Automated generation of attack trees. In: 2014 IEEE 27th Computer Security Foundations Symposium (CSF), pp. 337\u2013350, July 2014","DOI":"10.1109\/CSF.2014.31"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, S., Li, X., Xu, G., Zhang, L., Feng, Z.: Attack tree based android malware detection with hybrid analysis. In: IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 380\u2013387, September 2014","DOI":"10.1109\/TrustCom.2014.49"}],"container-title":["Lecture Notes in Computer Science","Graphical Models for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29968-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:15:39Z","timestamp":1559380539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29968-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319299679","9783319299686"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29968-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}