{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:40:46Z","timestamp":1725975646650},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_15","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"198-217","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Security Decision Support for Remediation in Automated Computer Network Defence"],"prefix":"10.1007","author":[{"given":"Maxwell","family":"Dondo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Kim, A., Kang, M.H.: Determining asset criticality for cyber defense. Naval Research Laboratory. Technical report NRL\/MR\/5540-11-9350 (2011)","DOI":"10.21236\/ADA550373"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Kim, A., Kang, M.H., Luo, J.Z., Velasquez, A.: A framework for event prioritization in cyber network defense. Naval Research Laboratory. Technical report NRL\/MR\/5540-14-9541 (2014)","DOI":"10.21236\/ADA608707"},{"key":"15_CR3","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security (2005)"},{"key":"15_CR4","unstructured":"Sawilla, R., Burrell, C.: Course of action recommendations for practical network defence. Defence Research and Development Canada. Technical Report DRDC Ottawa TM 2009\u2013130 (2009)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Sawilla, R., Skillicorn, D.: Partial cuts in attack graphs for cost effective network defense. In: IEEE International Conference on Technologies for Homeland Security, HST 2012, pp. 291\u2013297 (2012)","DOI":"10.1109\/THS.2012.6459864"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1037\/0033-295X.101.2.343","volume":"101","author":"GA Miller","year":"1994","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 101, 343 (1994)","journal-title":"Psychol. Rev."},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.4018\/jsse.2013010102","volume":"4","author":"S Miller","year":"2013","unstructured":"Miller, S., Appleby, S., Garibaldi, J.M., Aickelin, U.: Towards a more systematic approach to secure systems design and analysis. Int. J. Secure Softw. Eng. 4(1), 11\u201330 (2013)","journal-title":"Int. J. Secure Softw. Eng."},{"key":"15_CR8","unstructured":"Symantec: IT analytics 7.1 for altiris it management suite from symantec. Symantec, Technical report (2013)"},{"key":"15_CR9","unstructured":"RedSeal Networks. Security target. https:\/\/www.redseal.net"},{"key":"15_CR10","unstructured":"Dondo, M.: A neural network approach for cyber security course of action selection. Defence Research and Development Canada, Technical report DRDC-RDDC-2016-R269 (2016)"},{"key":"15_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9","volume-title":"Multiple Attribute Decision Making: Methods and Applications a State-of-the-Art Survey","author":"C-L Hwang","year":"2012","unstructured":"Hwang, C.-L., Yoon, K.: Multiple Attribute Decision Making: Methods and Applications a State-of-the-Art Survey. Springer Science & Business Media, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-48318-9"},{"key":"15_CR12","unstructured":"McKenzie, C.: GENESIS: integrated end-to-end decision support for computer network defence, design and architecture document. Defence Research and Development Canada. Technical report DRDC Ottawa CR 2011\u2013009 (2011)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Sawilla, R.E., Wiemer, D.J.: Automated computer network defence technology demonstration project (ARMOUR TDP): concept of operations, architecture, and integration framework. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 167\u2013172, November 2011","DOI":"10.1109\/THS.2011.6107865"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-88313-5_2","volume-title":"Computer Security - ESORICS 2008","author":"RE Sawilla","year":"2008","unstructured":"Sawilla, R.E., Ou, X.: Identifying critical attack assets in dependency attack graphs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 18\u201334. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88313-5_2"},{"key":"15_CR15","unstructured":"Symantec. Symantec patch management solution powered by altiris technology. http:\/\/www.symantec.com\/products"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Alhomidi, M., Reed, M.: Finding the minimum cut set in attack graphs using genetic algorithms. In: 2013 International Conference on Computer Applications Technology. ICCAT 2013, pp. 1\u20136, January 2013","DOI":"10.1109\/ICCAT.2013.6522000"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Hong, J., Kim, D.S., Haqiq, A.: What vulnerability do we need to patch first? In: 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. DSN 2014, pp. 684\u2013689, June 2014","DOI":"10.1109\/DSN.2014.68"},{"key":"15_CR18","unstructured":"Chakraborty, S., Yeh, C.-H.: A simulation based comparative study of normalization procedures in multiattribute decision making. In: Proceedings of the 6th Conference on Artificial Intelligence: Knowledge Engineering and Data Bases (2007)"},{"issue":"8","key":"15_CR19","doi-asserted-by":"publisher","first-page":"11363","DOI":"10.1016\/j.eswa.2009.03.039","volume":"36","author":"FE Boran","year":"2009","unstructured":"Boran, F.E., Gen\u00e7, S., Kurt, M., Akay, D.: A multi-criteria intuitionistic fuzzy group decision making for supplier selection with TOPSIS method. Expert Syst. Appl. 36(8), 11363\u201311368 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"15_CR20","first-page":"712","volume":"14","author":"H Safari","year":"2013","unstructured":"Safari, H., Khanmohammadi, E., Hafezamini, A., Ahangari, S.S.: A new technique for multi criteria decision making based on modified similarity method. Middle-East J. Sci. Res. 14(5), 712\u2013719 (2013)","journal-title":"Middle-East J. Sci. Res."},{"key":"15_CR21","first-page":"56","volume":"10","author":"M Velasquez","year":"2013","unstructured":"Velasquez, M., Hester, P.T.: An analysis of multi-criteria decision making methods. Int. J. Oper. Res. 10, 56\u201366 (2013)","journal-title":"Int. J. Oper. Res."},{"key":"15_CR22","volume-title":"The Delphi Method","author":"HA Linstone","year":"2002","unstructured":"Linstone, H.A., Turoff, M.: The Delphi Method. Addison-Wesley, Reading (2002)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T22:46:36Z","timestamp":1571265996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}