{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:51Z","timestamp":1725888471221},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_67","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"667-678","source":"Crossref","is-referenced-by-count":0,"title":["Cyber-Attack Risks Analysis Based on Attack-Defense Trees"],"prefix":"10.1007","author":[{"given":"Wenjun","family":"Sun","sequence":"first","affiliation":[]},{"given":"Liqun","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"issue":"4","key":"67_CR1","doi-asserted-by":"crossref","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"B Bencs\u00e1th","year":"2012","unstructured":"Bencs\u00e1th, B., P\u00e9k, G., Butty\u00e1n, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971\u20131003 (2012)","journal-title":"Future Internet"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Virvilis, N., Gritzalis, D.: The big four-what we did wrong in advanced persistent threat detection? In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 248\u2013254. IEEE, September 2013","DOI":"10.1109\/ARES.2013.32"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: Mitigating covert compromises. In: International Conference on Web and Internet Economics, pp. 319\u2013332. Springer, Heidelberg, December 2013","DOI":"10.1007\/978-3-642-45046-4_26"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: International Conference on Quantitative Evaluation of Systems, pp. 173\u2013176. Springer, Heidelberg, August 2013","DOI":"10.1007\/978-3-642-40196-1_15"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., Trujillo-Rasua, R.: Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In: International Conference on Quantitative Evaluation of Systems, pp. 159\u2013162. Springer International Publishing, August 2016","DOI":"10.1007\/978-3-319-43425-4_10"},{"issue":"12","key":"67_CR6","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dobb\u2019s J."},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information security and survivability. Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst (No. CMU-SEI-2001-TN-001) (2001)","DOI":"10.21236\/ADA387544"},{"key":"67_CR8","doi-asserted-by":"crossref","unstructured":"Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: IEEE Military Communications Conference, MILCOM 2006, pp. 1\u20137. IEEE, October 2006","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: The First International Conference on Availability, Reliability and Security, 2006, ARES 2006, pp. 8\u2013pp. IEEE, April 2006","DOI":"10.1109\/ARES.2006.46"},{"issue":"8","key":"67_CR10","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1002\/sec.299","volume":"5","author":"A Roy","year":"2012","unstructured":"Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929\u2013943 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: International Workshop on Formal Aspects in Security and Trust, pp. 80\u201395. Springer, Heidelberg, September 2010","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"67_CR12","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2012","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Attack\u2013defense trees. J. Logic Comput. 24, 55\u201387 (2012). exs029","journal-title":"J. Logic Comput."},{"issue":"3","key":"67_CR13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s12083-012-0127-9","volume":"7","author":"S Du","year":"2014","unstructured":"Du, S., Li, X., Du, J., Zhu, H.: An attack-and-defence game for security assessment in vehicular ad hoc networks. Peer-to-peer Netw. Appl. 7(3), 215\u2013228 (2014)","journal-title":"Peer-to-peer Netw. Appl."},{"key":"67_CR14","doi-asserted-by":"crossref","unstructured":"Ji, X., Yu, H., Fan, G., Fu, W.: Attack-defense trees based cyber security analysis for CPSs. In: 2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pp. 693\u2013698. IEEE, May 2016","DOI":"10.1109\/SNPD.2016.7515980"},{"key":"67_CR15","volume-title":"Targeted Attacks Against the Energy Sector","author":"C Wueest","year":"2014","unstructured":"Wueest, C.: Targeted Attacks Against the Energy Sector. Symantec Security Response, Mountain View (2014)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T05:20:57Z","timestamp":1569388857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_67","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}