{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:58:01Z","timestamp":1725908281593},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319665825"},{"type":"electronic","value":"9783319665832"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66583-2_15","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T22:02:48Z","timestamp":1502488968000},"page":"230-245","source":"Crossref","is-referenced-by-count":0,"title":["ADaCS: A Tool for Analysing Data Collection Strategies"],"prefix":"10.1007","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[]},{"given":"Nipun","family":"Thekkummal","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]},{"given":"Aad","family":"Van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,13]]},"reference":[{"key":"15_CR1","unstructured":"Ascough, J., Green, T., Ma, L., Ahuja, L.: Key criteria and selection of sensitivity analysis methods applied to natural resource models. In: Proceedings of the International Congress on Modeling and Simulation (2005)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In: Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF 2016), pp. 105\u2013119, June 2016","DOI":"10.1109\/CSF.2016.15"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-0-387-09762-6_7","volume-title":"Managing Information Risk and the Economics of Security","author":"A Beautement","year":"2009","unstructured":"Beautement, A., et al.: Modelling the human and technological costs and benefits of USB memory stick security. In: Johnson, M.E. (ed.) Managing Information Risk and the Economics of Security, pp. 141\u2013163. Springer, Boston (2009). doi:\n10.1007\/978-0-387-09762-6_7"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cain, R., Van Moorsel, A.: Optimization of data collection strategies for model-based evaluation and decision-making. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1\u201310 (2012)","DOI":"10.1109\/DSN.2012.6263947"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chan, K., Saltelli, A., Tarantola, S.: Sensitivity analysis of model output: variance-based methods make the difference. In: Proceedings of the 29th Conference on Winter Simulation, pp. 261\u2013268 (1997)","DOI":"10.1145\/268437.268489"},{"key":"15_CR6","volume-title":"Sampling Techniques","author":"W Cochran","year":"1977","unstructured":"Cochran, W.: Sampling Techniques, 3rd edn. Wiley, New York (1977)","edition":"3"},{"issue":"10","key":"15_CR7","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D Deavours","year":"2002","unstructured":"Deavours, D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J., Sanders, W., Webster, P.: The M\u00f6bius framework and its implementation. IEEE Trans. Softw. Eng. 28(10), 956\u2013969 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-54118-6_10","volume-title":"Collaborative Design for Embedded Systems","author":"C Gamble","year":"2014","unstructured":"Gamble, C., Pierce, K.: Design space exploration for embedded systems using co-simulation. In: Fitzgerald, J., Larsen, P.G., Verhoef, M. (eds.) Collaborative Design for Embedded Systems, pp. 199\u2013222. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-642-54118-6_10"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/3-540-58021-2_20","volume-title":"Computer Performance Evaluation Modelling Techniques and Tools","author":"S Gilmore","year":"1994","unstructured":"Gilmore, S., Hillston, J.: The PEPA workbench: a tool to support a process algebra-based approach to performance modelling. In: Haring, G., Kotsis, G. (eds.) TOOLS 1994. LNCS, vol. 794, pp. 353\u2013368. Springer, Heidelberg (1994). doi:\n10.1007\/3-540-58021-2_20"},{"issue":"1","key":"15_CR10","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/24.376541","volume":"44","author":"B Haverkort","year":"1995","unstructured":"Haverkort, B., Meeuwissen, A.: Sensitivity and uncertainty analysis of Markov-reward models. IEEE Trans. Reliab. 44(1), 147\u2013154 (1995)","journal-title":"IEEE Trans. Reliab."},{"issue":"1","key":"15_CR11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/5.21065","volume":"77","author":"Y-C Ho","year":"1989","unstructured":"Ho, Y.-C.: Introduction to special issue on dynamics of discrete event systems. Proc. IEEE 77(1), 3\u20136 (1989)","journal-title":"Proc. IEEE"},{"issue":"1","key":"15_CR12","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1080\/00949659708811805","volume":"57","author":"JP Kleijnen","year":"1997","unstructured":"Kleijnen, J.P.: Sensitivity analysis and related analyses: a review of some statistical techniques. J. Stat. Comput. Simul. 57(1), 111\u2013142 (1997)","journal-title":"J. Stat. Comput. Simul."},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80\u201395. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-19751-2_6"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-22110-1_47"},{"key":"15_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-2367-3","volume-title":"Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package","author":"R Sahner","year":"1996","unstructured":"Sahner, R., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer, Boston (1996)"},{"key":"15_CR16","volume-title":"Global Sensitivity Analysis. The Primer","author":"A Saltelli","year":"2008","unstructured":"Saltelli, A., Ratto, M., Andre, T., Campolongo, F., Cariboni, J., Gatelli, D., Saisana, M., Tarantola, S.: Global Sensitivity Analysis. The Primer. Wiley, West Sussex (2008)"},{"issue":"12","key":"15_CR17","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."}],"container-title":["Lecture Notes in Computer Science","Computer Performance Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66583-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T22:06:35Z","timestamp":1502489195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66583-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319665825","9783319665832"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66583-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}