{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:08:36Z","timestamp":1774264116096,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319458700","type":"print"},{"value":"9783319458717","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_12","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T04:25:24Z","timestamp":1472099124000},"page":"183-202","source":"Crossref","is-referenced-by-count":6,"title":["Cyber Security Risk Assessment of a DDoS Attack"],"prefix":"10.1007","author":[{"given":"Gaute","family":"Wangen","sequence":"first","affiliation":[]},{"given":"Andrii","family":"Shalaginov","sequence":"additional","affiliation":[]},{"given":"Christoffer","family":"Hallstensen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"12_CR1","unstructured":"2014\u20132015 DDoS attack duration and magnitude dataset. Technical report, Akamai Technologies (2015)"},{"key":"12_CR2","unstructured":"Information technology, security techniques, ISMS, overview and vocabulary, ISO\/IEC 27000:2014 (2014)"},{"key":"12_CR3","unstructured":"Information technology, security techniques, information security risk management, ISO\/IEC 27005:2011 (2011)"},{"key":"12_CR4","volume-title":"Misconceptions of Risk","author":"T Aven","year":"2011","unstructured":"Aven, T.: Misconceptions of Risk. Wiley, New York (2011)"},{"key":"12_CR5","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.ress.2011.11.006","volume":"99","author":"T Aven","year":"2012","unstructured":"Aven, T.: The risk concept - historical and recent development trends. Reliab. Eng. Syst. Saf. 99, 33\u201344 (2012)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Blakley, B., McDermott, E., Geer, D.: Information security is information risk management. In: Proceedings of the 2001 Workshop on New Security Paradigms, pp. 97\u2013104. ACM (2001)","DOI":"10.1145\/508171.508187"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Caralli, R.A., Stevens, J.F., Young, L.R., Wilson, W.R.: Introducing octave allegro: Improving the information security riskassessment process. Technical report, DTIC Document (2007)","DOI":"10.21236\/ADA470450"},{"key":"12_CR8","volume-title":"Measuring and Managing Information Risk: A FAIR Approach","author":"J Freund","year":"2014","unstructured":"Freund, J., Jones, J.: Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann, Newton (2014)"},{"key":"12_CR9","volume-title":"All in One - CISA - Certified Information Systems Auditor - Exam Guide","author":"PH Gregory","year":"2012","unstructured":"Gregory, P.H.: All in One - CISA - Certified Information Systems Auditor - Exam Guide. McGraw-Hill Companies, New York (2012)"},{"key":"12_CR10","unstructured":"Hilden, A.E.: UDP-Based DDoS Amplification Attacks. Norwegian Security Authority (NSM). Lecture held at NTNU (Gj\u00f8vik), 7 October 2015"},{"key":"12_CR11","volume-title":"Thinking, Fast and Slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman, D.: Thinking, Fast and Slow. Macmillan, New York (2011)"},{"issue":"1","key":"12_CR12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","volume":"1","author":"S Kaplan","year":"1981","unstructured":"Kaplan, S., Garrick, B.J.: On the quantitative definition of risk. Risk Anal. 1(1), 11\u201327 (1981)","journal-title":"Risk Anal."},{"key":"12_CR13","volume-title":"Halting the Hacker: A Practical Guide to Computer Security","author":"DL Pipkin","year":"2003","unstructured":"Pipkin, D.L.: Halting the Hacker: A Practical Guide to Computer Security, 2nd edn. Pearson Education, New York (2003)","edition":"2"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Shalaginov, A., Franke, K.: A new method of fuzzy patches construction in neuro-fuzzy for malware detection. In: IFSA-EUSFLAT. Atlantis Press (2015)","DOI":"10.2991\/ifsa-eusflat-15.2015.27"},{"issue":"4","key":"12_CR15","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1016\/j.ijforecast.2009.05.027","volume":"25","author":"NN Taleb","year":"2009","unstructured":"Taleb, N.N.: Errors, robustness, and the fourth quadrant. Int. J. Forecast. 25(4), 744\u2013759 (2009)","journal-title":"Int. J. Forecast."},{"key":"12_CR16","volume-title":"The Impact of the Highly Improbable","author":"NN Taleb","year":"2010","unstructured":"Taleb, N.N., Swan, T.B.: The Impact of the Highly Improbable, 2nd edn. Random House LLC, New York (2010)","edition":"2"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Wangen, G., Hallstensen, C., Snekkenes, E.: A framework for estimating information security risk assessment method completeness - core unified risk framework. Submitted for Review (2016)","DOI":"10.1007\/s10207-017-0382-0"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-31811-0_8","volume-title":"Risks and Security of Internet and Systems","author":"G Wangen","year":"2016","unstructured":"Wangen, G., Shalaginov, A.: Quantitative risk, statistical methods and the four quadrants for information security. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 127\u2013143. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-31811-0_8"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Wangen, G., Snekkenes, E.A.: A comparison between business process management and information security management. In: Paprzycki, M., Ganzha, M., Maciaszek, L. (ed.) Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, vol. 2, pp. 901\u2013910. IEEE (2014). Annals of Computer Science and Information Systems","DOI":"10.15439\/2014F77"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T19:15:32Z","timestamp":1568315732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}