{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:06:54Z","timestamp":1742940414410,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_7","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"75-87","source":"Crossref","is-referenced-by-count":15,"title":["Choosing Models for Security Metrics Visualization"],"prefix":"10.1007","author":[{"given":"Maxim","family":"Kolomeec","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Gonzalez-Granadillo","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Doynikova","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"7_CR1","unstructured":"Schmidt, M.: Return on Investment (ROI): Meaning and Use. Encyclopedia of Business Terms and Methods (2011). http:\/\/www.solutionmatrix.com\/return-on-investment.html"},{"issue":"1","key":"7_CR2","first-page":"45","volume":"38","author":"W Sonnenreich","year":"2006","unstructured":"Sonnenreich, W., Albanese, J., Stout, B.: Return on security Investment (ROSI) a practical quantitative model. J. Res. Pract. Inf. Technol. 38(1), 45\u201356 (2006)","journal-title":"J. Res. Pract. Inf. Technol."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Kolomeets, M., Chechulin, A., Kotenko, I.: Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams. In: International Cross-Domain Conference, and Workshop on Privacy Aware Machine Learning for Health Data Science (2016)","DOI":"10.1007\/978-3-319-45507-5_10"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-31811-0_7","volume-title":"Risks and Security of Internet and Systems","author":"E Doynikova","year":"2016","unstructured":"Doynikova, E., Kotenko, I.: Countermeasure selection based on the attack and service dependency graphs for security incident management. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 107\u2013124. Springer, Cham (2016). doi: 10.1007\/978-3-319-31811-0_7"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks. In: Security and Privacy in Communication Networks, pp. 26\u201329 (2015)","DOI":"10.1007\/978-3-319-28865-9_29"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Gonzalez Granadillo, G., Alvarez, E., El-Barbori, M., Garcia-Alfaro, J., Debar, H.: Selecting optimal countermeasures for attacks against critical systems using the Attack Volume model and the RORI index. J. Comput. Electr. Eng. 13\u201334 (2015)","DOI":"10.1016\/j.compeleceng.2015.07.023"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for cost-sensitive intrusion response. In: 15th European Symposium on Research in Computer Security (ESORICS), pp. 626\u2013642 (2010)","DOI":"10.1007\/978-3-642-15497-3_38"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Dini, G., Tiloca, M.: A simulation tool for evaluating attack impact in cyber physical systems. In: International Workshop Modelling and Simulation for Autonomous Systems, pp. 77\u201394 (2014)","DOI":"10.1007\/978-3-319-13823-7_8"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Howard, M., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st Century, pp. 109\u2013137 (2005)","DOI":"10.1007\/0-387-24006-3_8"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Manadhata, P., Wing, J.: An attack surface metric. J. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2011)","DOI":"10.1109\/TSE.2010.60"},{"key":"7_CR11","unstructured":"Mell, P., Scarforne, K., Romanosky, S.: A complete guide to the common vulnerability scoring system (CVSS) version 2.0. In: FIRST-Forum of Incident Response and Security Teams, p. 23 (2007)"},{"key":"7_CR12","unstructured":"The Center for Internet Security. The CIS Security Metrics, 175 p. (2009)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Kotenko, I.V., Doynikova, E.: Dynamical calculation of security metrics for countermeasure selection in computer networks. In: 24th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2016), pp. 558\u2013565. IEEE Computer Society, Los Alamitos (2016)","DOI":"10.1109\/PDP.2016.96"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. NIST Interagency Report 7788, Gaithersburg: National Institute of Standards and Technology, 24 p. (2011)","DOI":"10.6028\/NIST.IR.7788"},{"key":"7_CR15","unstructured":"Puangsri, P.: Quantified return on information security investment - a model for cost-benefit analysis. Master Thesis, Delft University of Technology (2009)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Gonzalez Granadillo, G., Garcia-Alfaro, J., Debar, H.: An n-sided polygonal model to calculate the impact of cyber security events. In: International Conference on Risks and Security of Internet and Systems (2016)","DOI":"10.1007\/978-3-319-54876-0_7"},{"key":"7_CR17","unstructured":"Special operations forces intelligence and electronic warfare operations, appendix D: Target analysis process, Federation of American Scientists (1991). http:\/\/www.fas.org\/irp\/doddir\/army\/fm34-36\/appd.htm"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Gonzalez Granadillo, G., Rubio-Hernan, J., Garcia-Alfaro, J., Debar, H.: Considering internal vulnerabilities and the attacker\u2019s knowledge to model the impact of cyber events as geometrical prisms. In: Conference on Trust, Security and Privacy in Computing and Communications (2016)","DOI":"10.1109\/TrustCom.2016.0082"},{"key":"7_CR19","first-page":"96","volume-title":"Visual Grammar","author":"C Leborg","year":"2006","unstructured":"Leborg, C.: Visual Grammar, 1st edn, p. 96. Princeton Architectural Press, New York (2006)","edition":"1"},{"issue":"4","key":"7_CR20","first-page":"60","volume":"5","author":"MV Kolomeec","year":"2015","unstructured":"Kolomeec, M.V., Chechulin, A.A., Kotenko, I.V.: Methodological primitives for phased construction of data visualization models. J. Internet Serv. Inf. Secur. (JISIS) 5(4), 60\u201384 (2015)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Holten, D.: Hierarchical edge bundles: visualization of adjacency relations in hierarchical data. IEEE Trans. Vis. Comput. Graph. 12(5) (2006)","DOI":"10.1109\/TVCG.2006.147"},{"key":"7_CR22","unstructured":"Haber, R.B., McNabb, D.A.: Visualization idioms: a conceptual model for scientific visualization systems. In: Visualization in Scientific Computing, pp. 74\u201393. IEEE Computer Society Press (1990)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.L.: Towards a framework for cyber attack impact analysis of the electric smart grid. In: International Conference on Smart Grid Communications, pp. 244\u2013249 (2010)","DOI":"10.1109\/SMARTGRID.2010.5622049"},{"key":"7_CR24","unstructured":"Duan, C., Cleland-Huang, J.: Automated safeguard selection strategies. In: CTI Research Symposium (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:15Z","timestamp":1569967995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}