{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T04:10:03Z","timestamp":1751170203036,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_5","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T16:44:29Z","timestamp":1513874669000},"page":"63-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System"],"prefix":"10.1007","author":[{"given":"Bastien","family":"Sultan","sequence":"first","affiliation":[]},{"given":"Fabien","family":"Dagnat","sequence":"additional","affiliation":[]},{"given":"Caroline","family":"Fontaine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"5_CR1","unstructured":"Abou El Kalam, A.: Security of critical infrastructures and networks. Habilitation \u00e0 diriger les recherches, Institut National Polytechnique de Toulouse - INPT, December 2009"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-10506-2_4","volume-title":"Computer Safety, Reliability, and Security","author":"BK Aichernig","year":"2014","unstructured":"Aichernig, B.K., H\u00f6rmaier, K., Lorber, F.: Debugging with timed automata mutations. In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 49\u201364. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10506-2_4"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Berthomieu, B., Bodeveix, J.-P., Farail, P., Filali, M., Garavel, H., Gaufillet, P., Lang, F., Vernadat, F.: Fiacre: an intermediate language for model verification in the Topcased environment. In: ERTS 2008, Toulouse, France, January 2008","DOI":"10.1007\/978-3-642-01924-1_15"},{"issue":"1","key":"5_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MS.2003.1159029","volume":"20","author":"B Brykczynski","year":"2003","unstructured":"Brykczynski, B., Small, R.A.: Reducing internet-based intrusions: effective security patch management. IEEE Softw. 20(1), 50\u201357 (2003)","journal-title":"IEEE Softw."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chang, C.-W., Tsai, D.-R., Tsai, J.-M.: A cross-site patch management model and architecture design for large scale heterogeneous environment. In: 2005 39th Annual 2005 International Carnahan Conference on Security Technology, CCST 2005, pp. 41\u201346, October 2005","DOI":"10.1109\/CCST.2005.1594837"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Dhaussy, P., Roger, J.C., Boniol, F.: Reducing state explosion with context modeling for model-checking. In: 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering, pp. 130\u2013137, November 2011","DOI":"10.1109\/HASE.2011.24"},{"key":"5_CR7","unstructured":"U.S. DHS National Cyber Security Division: National Cyber Security Division, Recommended Practice for Patch Management of Control Systems. December 2008"},{"issue":"1","key":"5_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jcss.2016.02.004","volume":"83","author":"G Gonzalez-Granadillo","year":"2017","unstructured":"Gonzalez-Granadillo, G., Garcia-Alfaro, J., Debar, H.: A polytope-based approach to measure the impact of events against critical infrastructures. J. Comput. Syst. Sci. 83(1), 3\u201321 (2017)","journal-title":"J. Comput. Syst. Sci."},{"key":"5_CR9","unstructured":"Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: 14th International Conference on Information Fusion, pp. 1\u20138, July 2011"},{"key":"5_CR10","unstructured":"Jaworski, L.M.: Tandem threat scenarios: a risk assessment approach. In: Proceedings of the 16th National Computer Security Conference, pp. 155\u2013164 (1993)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the impact of cyber attacks on missions. In: International Conference on Cyber Warfare and Security, p. 446. Academic Conferences International Limited (2010)","DOI":"10.1109\/SYSCON.2011.5929055"},{"key":"5_CR12","unstructured":"U.S. Department of Defense: Department of Defense Handbook: System Security Engineering - Program Management Requirements, MIL-HDBK-1785 (1995)"},{"key":"5_CR13","unstructured":"Sultan, B., Dagnat, F., Fontaine, C.: Ma\u00eetrise des correctifs de s\u00e9curit\u00e9 pour les syst\u00e8mes navals. In: CIEL 2016: 5\u00e8me Conf\u00e9rence en Ing\u00e9nierie du Logiciel, pp. 1\u20136 (2016)"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T03:42:04Z","timestamp":1751168524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}