{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:38:54Z","timestamp":1742917134159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_2","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T01:20:20Z","timestamp":1474420820000},"page":"19-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Bifurcation of Slow Versus Fast Cyber-Attackers"],"prefix":"10.1007","author":[{"given":"Maarten","family":"van Wieren","sequence":"first","affiliation":[]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[]},{"given":"Vivian","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Wolter","family":"Pieters","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Atzeni, A., Cameroni, C., Faily, S., Lyle, J., Fl\u00e9chais, I.: Here\u2019s Johnny: A methodology for developing attacker personas. In: Sixth International Conference on Availability, Reliability and Security (ARES), pp. 722\u2013727. IEEE (2011)","DOI":"10.1109\/ARES.2011.115"},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.1073\/pnas.1322638111","volume":"111","author":"R Axelrod","year":"2014","unstructured":"Axelrod, R., Iliev, R.: Timing of cyber conflict. Proc. Nat. Acad. Sci. 111(4), 1298\u20131303 (2014)","journal-title":"Proc. Nat. Acad. Sci."},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0378-4371(00)00018-2","volume":"281","author":"AL Barab\u00e1si","year":"2000","unstructured":"Barab\u00e1si, A.L., Albert, R., Jeong, H.: Scale-free characteristics of random networks: the topology of the world-wide web. Physica A Stat. Mech. Appl. 281(1), 69\u201377 (2000)","journal-title":"Physica A Stat. Mech. Appl."},{"issue":"8","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1111\/j.1539-6924.2009.01247.x","volume":"29","author":"LAT Cox Jr","year":"2009","unstructured":"Cox Jr, L.A.T.: Game theory and risk analysis. Risk Anal. 29(8), 1062\u20131068 (2009)","journal-title":"Risk Anal."},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-34266-0_5","volume-title":"Decision and Game Theory for Security","author":"L Dritsoula","year":"2012","unstructured":"Dritsoula, L., Loiseau, P., Musacchio, J.: Computing the nash equilibria of intruder classification games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 78\u201397. Springer, Heidelberg (2012)"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"2_CR7","unstructured":"Herley, C.: The plight of the targeted attacker in a world of scale. In: WEIS (2010)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-12601-2_10","volume-title":"Decision and Game Theory for Security","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Horvath, G., Felegyhazi, M., Butty\u00e1n, L.: FlipThem: Modeling targeted attacks with FlipIt for multiple resources. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 175\u2013194. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12601-2_10"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-319-11599-3_12","volume-title":"Secure IT Systems","author":"A Lenin","year":"2014","unstructured":"Lenin, A., Willemson, J., Sari, D.P.: Attacker profiling in quantitative security assessment based on attack trees. In: Bernsmed, K., Fischer-H\u00fcbner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 199\u2013212. Springer, Heidelberg (2014)"},{"key":"2_CR10","unstructured":"Nochenson, A., Grossklags, J., et al.: A behavioral investigation of the FlipIt game. In: Proceedings of the 12th Workshop on the Economics of Information Security (WEIS) (2013)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-319-17016-9_13","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"W Pieters","year":"2015","unstructured":"Pieters, W., Davarynejad, M.: Calculating adversarial risk from attack trees: control strength and probabilistic attackers. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/SETOP\/QASA 2014. LNCS, vol. 8872, pp. 201\u2013215. Springer, Heidelberg (2015)"},{"issue":"1\u20132","key":"2_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/01402390.2014.977382","volume":"38","author":"T Rid","year":"2015","unstructured":"Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1\u20132), 4\u201337 (2015)","journal-title":"J. Strateg. Stud."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Van Ark, B., Inklaar, R., McGuckin, R.H.: Changing gear: productivity, ICT andservice industries in Europe and the United States. The Industrial Dynamics ofthe New Digital Economy, Edward Elgar, pp. 56\u201399 (2003)","DOI":"10.4337\/9781781957547.00012"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Dijk Van","year":"2013","unstructured":"Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of \"stealthy takeover\". J. Cryptology 26(4), 655\u2013713 (2013)","journal-title":"J. Cryptology"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Virvilis, N., Gritzalis, D.: The big four - what we did wrong in advanced persistent threat detection? In: Eighth International Conference on Availability, Reliability and Security (ARES), pp. 248\u2013254. IEEE (2013)","DOI":"10.1109\/ARES.2013.32"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T05:53:27Z","timestamp":1692510807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}