{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:49:08Z","timestamp":1749271748371,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319681788"},{"type":"electronic","value":"9783319681795"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68179-5_17","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T06:04:13Z","timestamp":1510034653000},"page":"193-205","source":"Crossref","is-referenced-by-count":4,"title":["Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing"],"prefix":"10.1007","author":[{"given":"Oussama","family":"Mjihil","sequence":"first","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"key":"17_CR1","unstructured":"Open daylight. http:\/\/www.opendaylight.org\/ . Accessed 24 Oct 2017"},{"key":"17_CR2","unstructured":"The openvas website. http:\/\/www.openvas.org\/ . Accessed 24 Oct 2017"},{"key":"17_CR3","volume-title":"Nessus Network Auditing","author":"J Beale","year":"2004","unstructured":"Beale, J., Deraison, R., Meer, H., Temmingh, R., Walt, C.V.D.: Nessus Network Auditing. Syngress Publishing, Rockland (2004)"},{"key":"17_CR4","first-page":"423","volume":"10","author":"M Ben-Yehuda","year":"2010","unstructured":"Ben-Yehuda, M., Day, M.D., Dubitzky, Z., Factor, M., Har\u2019El, N., Gordon, A., Liguori, A., Wasserman, O., Yassour, B.-A.: The turtles project: design and implementation of nested virtualization. OSDI 10, 423\u2013436 (2010)","journal-title":"OSDI"},{"key":"17_CR5","unstructured":"Bui, T.N., Jones, C.: A heuristic for reducing fill-in in sparse matrix factorization. Technical report, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA (United States) (1993)"},{"issue":"4","key":"17_CR6","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1137\/S0097539792229507","volume":"26","author":"D Dor","year":"1997","unstructured":"Dor, D., Tarsi, M.: Graph decomposition is NP-complete: a complete proof of Holyer\u2019s conjecture. SIAM J. Comput. 26(4), 1166\u20131187 (1997)","journal-title":"SIAM J. Comput."},{"key":"17_CR7","unstructured":"Fishman, A., Rapoport, M., Budilovsky, E., Eidus, I., et al.: HVX: virtualizing the cloud. In: HotCloud. Citeseer (2013)"},{"key":"17_CR8","unstructured":"Open Networking Foundation: Software-defined networking: the new norm for networks. ONF White Paper (2012)"},{"issue":"3","key":"17_CR9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0020-0190(00)00051-X","volume":"74","author":"HN Gabow","year":"2000","unstructured":"Gabow, H.N.: Path-based depth-first search for strong and biconnected components. Inf. Process. Lett. 74(3), 107\u2013114 (2000)","journal-title":"Inf. Process. Lett."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Karypis, G., Kumar, V.: Analysis of multilevel graph partitioning. In: Proceedings of the 1995 ACM\/IEEE Conference on Supercomputing, p. 29. ACM (1995)","DOI":"10.1145\/224170.224229"},{"issue":"1","key":"17_CR11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1006\/jpdc.1997.1404","volume":"48","author":"G Karypis","year":"1998","unstructured":"Karypis, G., Kumar, V.: Multilevel k-way partitioning scheme for irregular graphs. J. Parallel Distrib. comput. 48(1), 96\u2013129 (1998)","journal-title":"J. Parallel Distrib. comput."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Karypis, G., Schloegel, K., Kumar, V.: Parmetis: parallel graph partitioning and sparse matrix ordering library. Version 1.0, Department of Computer Science, University of Minnesota (1997)","DOI":"10.1006\/jpdc.1997.1403"},{"issue":"5","key":"17_CR13","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TDSC.2015.2423682","volume":"13","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K., Sivrikaya, F.: Distributed attack graph generation. IEEE Trans. Dependable Secure Comput. 13(5), 519\u2013532 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"17_CR14","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1002\/j.1538-7305.1970.tb01770.x","volume":"49","author":"BW Kernighan","year":"1970","unstructured":"Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 49(2), 291\u2013307 (1970)","journal-title":"Bell Syst. Tech. J."},{"issue":"2","key":"17_CR15","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim, H., Feamster, N.: Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114\u2013119 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)","DOI":"10.1145\/1868447.1868466"},{"key":"17_CR17","volume-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning","author":"GF Lyon","year":"2009","unstructured":"Lyon, G.F.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure, Cheers (2009)"},{"issue":"2","key":"17_CR18","first-page":"30","volume":"17","author":"N McKeown","year":"2009","unstructured":"McKeown, N.: Software-defined networking. INFOCOM Keynote Talk 17(2), 30\u201332 (2009)","journal-title":"INFOCOM Keynote Talk"},{"issue":"2","key":"17_CR19","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"2","key":"17_CR21","first-page":"283","volume":"11","author":"O Mjihil","year":"2016","unstructured":"Mjihil, O., Kim, D.S., Haqiq, A.: Security assessment framework for multi-tenant cloud with nested virtualization. J. Inf. Assur. Secur. 11(2), 283\u2013292 (2016)","journal-title":"J. Inf. Assur. Secur."},{"issue":"3","key":"17_CR22","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutorials 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336\u2013345. ACM (2006)","DOI":"10.1145\/1180405.1180446"},{"key":"17_CR24","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security (2005)"},{"issue":"12","key":"17_CR25","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobbs J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobbs J."},{"issue":"1","key":"17_CR26","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0898-1221(81)90008-0","volume":"7","author":"M Sharir","year":"1981","unstructured":"Sharir, M.: A strong-connectivity algorithm and its applications in data flow analysis. Comput. Math. Appl. 7(1), 67\u201372 (1981)","journal-title":"Comput. Math. Appl."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE Symposium on Security and privacy, pp. 273\u2013284. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"issue":"1","key":"17_CR28","first-page":"42","volume":"36","author":"O Tange","year":"2011","unstructured":"Tange, O., et al.: GNU parallel-the command-line power tool. USENIX Mag. 36(1), 42\u201347 (2011)","journal-title":"USENIX Mag."},{"issue":"2","key":"17_CR29","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1137\/0201010","volume":"1","author":"R Tarjan","year":"1972","unstructured":"Tarjan, R.: Depth-first search and linear graph algorithms. SIAM J. Comput. 1(2), 146\u2013160 (1972)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68179-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T15:02:39Z","timestamp":1570287759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68179-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681788","9783319681795"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68179-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}