{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:49:20Z","timestamp":1769752160339,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319713670","type":"print"},{"value":"9783319713687","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_11","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Effective Defence Against Zero-Day Exploits Using Bayesian Networks"],"prefix":"10.1007","author":[{"given":"Tingting","family":"Li","sequence":"first","affiliation":[]},{"given":"Chris","family":"Hankin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"11_CR1","unstructured":"BSI: Industrial control system security top 10 threats and countermeasures 2014, March 2014. www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_downloads\/ techniker\/hardware\/BSI-CS_005E.pdf"},{"key":"11_CR2","unstructured":"Christey, S., Glenn, R., et al.: Common weakness enumeration (2013)"},{"key":"11_CR3","unstructured":"U.S. Department of Homeland Security: Common cybersecurity vulnerabilities in industrial control systems (2011). www.ics-cert.us-cert.gov\/sites\/default\/files\/ documents\/DHS_Common_Cybersecurity_Vulnerabilities_ICS_20110523.pdf"},{"key":"11_CR4","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32: Stuxnet dossier. White paper, Symantec Corp., Security Response 5 (2011)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Fielder, A., Li, T., Hankin, C.: Defense-in-depth vs. critical component defense for industrial control systems. In: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research. British Computer Society (2016)","DOI":"10.14236\/ewic\/ICS2016.1"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-319-45477-1_15","volume-title":"Computer Safety, Reliability, and Security","author":"A Fielder","year":"2016","unstructured":"Fielder, A., Li, T., Hankin, C.: Modelling cost-effectiveness of defenses in industrial control systems. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 187\u2013200. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_15"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.dss.2016.02.012","volume":"86","author":"A Fielder","year":"2016","unstructured":"Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13\u201323 (2016)","journal-title":"Decis. Support Syst."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Frigault, M., Wang, L.: Measuring network security using Bayesian network-based attack graphs. In: 2008 32nd Annual IEEE International Computer Software and Applications Conference, pp. 698\u2013703, July 2008","DOI":"10.1109\/COMPSAC.2008.88"},{"key":"11_CR9","unstructured":"Hugin Expert A\/S. Hugin lite 8.3 (2016). http:\/\/www.hugin.com"},{"key":"11_CR10","unstructured":"ICS-CERT: Incident response activity July 2015\u2013August 2015 (2015). https:\/\/ics-cert.us-cert.gov\/monitors\/ICS-MM201508"},{"key":"11_CR11","unstructured":"ICS-CERT: Incident response activity September 2014\u2013February 2015 (2015). www.ics-cert.us-cert.gov\/monitors\/ICS-MM201502"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Kornecki, A.J., Subramanian, N., Zalewski, J.: Studying interrelationships of safety and security for software assurance in cyber-physical systems: approach based on Bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1393\u20131399. IEEE (2013)","DOI":"10.1109\/SysCon.2013.6549949"},{"key":"11_CR13","volume-title":"Robust Control System Networks-How to Achieve Reliable Control After Stuxnet","author":"R Langer","year":"2012","unstructured":"Langer, R.: Robust Control System Networks-How to Achieve Reliable Control After Stuxnet. Momentum Press, New York (2012)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Li, T., Hankin, C.: A model-based approach to interdependency between safety and security in ICS. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, pp. 31\u201341. British Computer Society (2015)","DOI":"10.14236\/ewic\/ICS2015.4"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Y., Man, H.: Network vulnerability assessment using Bayesian networks. In: Defense and Security, pp. 61\u201371. International Society for Optics and Photonics (2005)","DOI":"10.1117\/12.604240"},{"key":"11_CR16","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., Sgandurra, D., Barr\u00e8re, M., Lupu, E.: Exact inference techniques for the dynamic analysis of attack graphs. arXiv preprint arXiv:1510.02427 (2015)"},{"key":"11_CR17","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J Pearl","year":"2014","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, Burlington (2014)"},{"issue":"1","key":"11_CR18","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2012","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61\u201374 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR19","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST special publication (2011). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-82\/SP800-82-final.pdf"},{"issue":"1","key":"11_CR20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TDSC.2013.24","volume":"11","author":"L Wang","year":"2014","unstructured":"Wang, L., Jajodia, S., Singhal, A., Cheng, P., Noel, S.: k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans. Dependable Secure Comput. 11(1), 30\u201344 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-11212-1_28","volume-title":"Computer Security - ESORICS 2014","author":"L Wang","year":"2014","unstructured":"Wang, L., Zhang, M., Jajodia, S., Singhal, A., Albanese, M.: Modeling network diversity for evaluating the robustness of networks against zero-day attacks. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 494\u2013511. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_28"},{"issue":"4","key":"11_CR22","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/j.engappai.2010.06.002","volume":"25","author":"P Weber","year":"2012","unstructured":"Weber, P., Medina-Oliva, G., Simon, C., Iung, B.: Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Eng. Appl. Artif. Intell. 25(4), 671\u2013682 (2012)","journal-title":"Eng. Appl. Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T19:46:22Z","timestamp":1659901582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}