{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T21:40:09Z","timestamp":1751838009036,"version":"3.41.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926230"},{"type":"electronic","value":"9783319926247"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92624-7_7","type":"book-chapter","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T10:46:11Z","timestamp":1536057971000},"page":"159-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study"],"prefix":"10.1007","author":[{"given":"Saad","family":"Khan","sequence":"first","affiliation":[]},{"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE Infocom. Ieee, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.scico.2003.08.001","volume":"49","author":"M Burgess","year":"2003","unstructured":"Burgess M (2003) On the theory of system administration. Sci Comput Program 49(1):1\u201346","journal-title":"Sci Comput Program"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.ieri.2014.09.081","volume":"10","author":"H Wang","year":"2014","unstructured":"Wang H, Guo X, Fan Y, Bi J (2014) Extended access control and recommendation methods for enterprise knowledge management system. IERI Procedia 10:224\u2013230","journal-title":"IERI Procedia"},{"key":"7_CR4","unstructured":"Stiawan D, Idris M, Abdullah AH et al (2015) Penetration testing and network auditing: Linux. J Inf Process Syst 11(1)"},{"key":"7_CR5","volume-title":"Automated planning: theory and practice","author":"M Ghallab","year":"2004","unstructured":"Ghallab M, Nau DS, Traverso P (2004) Automated planning: theory and practice. Elsevier\/Morgan Kaufmann, London, Amsterdam"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Tourani R, Misra S, Mick T, Panwar G (2017) Security, privacy, and access control in information-centric networking: a survey. In: IEEE communications surveys & tutorials","DOI":"10.1109\/COMST.2017.2749508"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Demchenko Y, Ngo C, De\u00a0Laat C (2011) Access control infrastructure for on-demand provisioned virtualised infrastructure services. In: 2011 international conference on collaboration technologies and systems (CTS). IEEE, pp. 466\u2013475","DOI":"10.1109\/CTS.2011.5928725"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kalam AAE, Baida RE, Balbiani P, Benferhat S, Cuppens F, Deswarte Y, Miege A, Saurel C, Trouessin G (2003) Organization based access control. In: IEEE 4th international workshop on policies for distributed systems and networks, 2003. Proceedings. POLICY 2003. IEEE, pp 120\u2013131","DOI":"10.1109\/POLICY.2003.1206966"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38\u201347","journal-title":"Computer"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-based access control. Computer 48(2):85\u201388","journal-title":"Computer"},{"key":"7_CR11","first-page":"011","volume":"1","author":"J-B Deng","year":"2003","unstructured":"Deng J-B, Hong F (2003) Task-based access control model [j]. J Softw 1:011","journal-title":"J Softw"},{"issue":"4","key":"7_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0167-4048(02)00403-0","volume":"21","author":"S Purser","year":"2002","unstructured":"Purser S (2002) Why access control is difficult. Comput Secur 21(4):303\u2013309","journal-title":"Comput Secur"},{"key":"7_CR13","unstructured":"C\u00e1rdenas AA, Amin S, Sastry S (2008) Research challenges for the security of control systems. In: HotSec"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Bauer L, Cranor LF, Reeder RW, Reiter MK, Vaniea K (2009) Real life challenges in access-control management. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 899\u2013908","DOI":"10.1145\/1518701.1518838"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Martin E, Xie T (2006) Inferring access-control policy properties via machine learning. In: Seventh ieee international workshop on policies for distributed systems and networks, 2006. Policy 2006. IEEE, p 4","DOI":"10.1109\/POLICY.2006.19"},{"key":"7_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01433-3","volume-title":"Automated security management","author":"E Al-Shaer","year":"2013","unstructured":"Al-Shaer E, Ou X, Xie G (2013) Automated security management. Springer, Berlin"},{"key":"7_CR17","first-page":"52","volume":"40","author":"S Parkinson","year":"2018","unstructured":"Parkinson S, Khan S (2018) Identifying irregularities in security event logs through an object-based chi-squared test of independence. J Inf Secur Appl 40:52\u201362","journal-title":"J Inf Secur Appl"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Parkinson S, Crampton A (2016) Identification of irregularities and allocation suggestion of relative file system permissions. In: Journal of information security and applications","DOI":"10.1016\/j.jisa.2016.04.004"},{"key":"7_CR19","unstructured":"Parkinson S, Hardcastle D (2014) Automated planning for file system interaction. In: 32nd workshop of the UK planning and scheduling special interest group. http:\/\/eprints.hud.ac.uk\/22897\/"},{"key":"7_CR20","unstructured":"Boddy MS, Gohde J, Haigh T, Harp SA (2005) Course of action generation for cyber security using classical planning. In: ICAPS, pp 12\u201321"},{"key":"7_CR21","unstructured":"Steinmetz M (2016) Critical constrained planning and an application to network penetration testing. In: The 26th international conference on automated planning and scheduling, p 141"},{"key":"7_CR22","unstructured":"Khan S, Parkinson S (2017) Towards automated vulnerability assessment"},{"key":"7_CR23","unstructured":"Riabov A, Sohrabi S, Udrea O, Hassanzadeh O (2016) Efficient high quality plan exploration for network security. In: International scheduling and planning applications woRKshop (SPARK)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sohrabi S, Riabov A, Udrea O, Hassanzadeh O (2016) Finding diverse high-quality plans for hypothesis generation. In: Proceedings of the 22nd European conference on artificial intelligence (ECAI)","DOI":"10.3233\/978-1-61499-672-9-1581"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10489-010-0266-8","volume":"36","author":"N Ghosh","year":"2012","unstructured":"Ghosh N, Ghosh SK (2012) A planner-based approach to generate and analyze minimal attack graph. Appl Intell 36(2):369\u2013390","journal-title":"Appl Intell"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Durkota K, Lis\u1ef3 V (2014) Computing optimal policies for attack graphs with action failures and costs. In: STAIRS, pp 101\u2013110","DOI":"10.3233\/978-1-61499-421-3-101"},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10489-015-0749-8","volume":"45","author":"R Hewett","year":"2016","unstructured":"Hewett R, Kijsanayothin P, Bak S, Galbrei M (2016) Cybersecurity policy verification with declarative programming. Appl Intell 45(1):83\u201395","journal-title":"Appl Intell"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Hoffmann J (2015) Simulated penetration testing: from \u201cdijkstra\u201d to \u201cturing test++\u201d. In: ICAPS, pp 364\u2013372","DOI":"10.1609\/icaps.v25i1.13684"},{"key":"7_CR29","unstructured":"Shmaryahu D (2016) Constructing plan trees for simulated penetration testing. In: The 26th international conference on automated planning and scheduling"},{"key":"7_CR30","unstructured":"Sarraute C, Buffet O, Hoffmann J et al (2012) Pomdps make better hackers: accounting for uncertainty in penetration testing. In: AAAI"},{"key":"7_CR31","unstructured":"Backes M, Hoffmann J, K\u00fcnnemann R, Speicher P, Steinmetz M (2017) Simulated penetration testing and mitigation analysis. arXiv:1705.05088"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Sarraute C, Richarte G, Luc\u00e1ngeli\u00a0Obes J (2011) An algorithm to find optimal attack paths in nondeterministic scenarios. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. ACM, pp 71\u201380","DOI":"10.1145\/2046684.2046695"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Parkinson S, Longstaff AP, Fletcher S, Vallati M, Chrpa L (2017) On the exploitation of automated planning for reducing machine tools energy consumption between manufacturing operations. In: Association for the advancement of artificial intelligence AAAI","DOI":"10.1609\/icaps.v27i1.13843"},{"key":"7_CR34","unstructured":"Cenamor I, Chrpa L, Jimoh F, McCluskey TL, Vallati M (2014) Planning & scheduling applications in urban traffic management. In: Proceedings of the UK planning & scheduling special interest group"},{"key":"7_CR35","unstructured":"Do MB, Ruml W, Zhou R (2008) On-line planning and scheduling: an application to controlling modular printers. In: AAAI, pp 1519\u20131523"},{"key":"7_CR36","unstructured":"Herry H, Anderson P, Wickler G (2011) Automated planning for configuration changes"},{"key":"7_CR37","unstructured":"Herry H, Anderson P (2012) Planning with global constraints for computing infrastructure reconfiguration. In: Proceedings of the 2012 AAAI workshop on problem solving using classical planners. AAAI Press"},{"issue":"4","key":"7_CR38","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/3004294","volume":"49","author":"I Georgievski","year":"2016","unstructured":"Georgievski I, Aiello M (2016) Automated planning for ubiquitous computing. ACM Comput Surv (CSUR) 49(4):63","journal-title":"ACM Comput Surv (CSUR)"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Oberlin J, Tellex S (2018) Autonomously acquiring instance-based object models from experience. In: Robotics research. Springer, pp 73\u201390","DOI":"10.1007\/978-3-319-60916-4_5"},{"key":"7_CR40","unstructured":"Shah M, Chrpa L, Jimoh F, Kitchin D, McCluskey T, Parkinson S, Vallati M (2013) Knowledge engineering tools in planning: state-of-the-art and future challenges. In: Knowledge engineering for planning and scheduling, vol 53"},{"key":"7_CR41","doi-asserted-by":"publisher","unstructured":"Khan S, Parkinson S (2017) Causal connections mining within security event logs. In: Proceedings of the 9th international conference on knowledge capture. ACM. https:\/\/doi.org\/10.1145\/3148011.3154476 . http:\/\/eprints.hud.ac.uk\/id\/eprint\/33841\/","DOI":"10.1145\/3148011.3154476"},{"key":"7_CR42","unstructured":"McDermott D, Ghallab M, Howe A, Knoblock C, Ram A, Veloso M, Weld D, Wilkins D (1998) Pddl-the planning domain definition language"},{"key":"7_CR43","unstructured":"Edelkamp S, Hoffmann J (2004) PDDL2.2: the language for the classical part of the 4th international planning competition. Technical Report 195, Albert-Ludwigs-Universitat Freiburg, Institut fur Informatik"},{"key":"7_CR44","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1613\/jair.1183","volume":"20","author":"A Gerevini","year":"2003","unstructured":"Gerevini A, Saetti A, Serina I (2003) Planning through stochastic local search and temporal action graphs in lpg. J Artif Intell Res 20:239\u2013290","journal-title":"J Artif Intell Res"},{"issue":"5","key":"7_CR45","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.artint.2008.11.009","volume":"173","author":"M Roberts","year":"2009","unstructured":"Roberts M, Howe A (2009) Learning from planner performance. Artif Intell 173(5):536\u2013561","journal-title":"Artif Intell"},{"key":"7_CR46","unstructured":"Alford R, Kuter U, Nau DS (2009) Translating htns to pddl: a small amount of domain knowledge can go a long way. In: IJCAI, pp 1629\u20131634"}],"container-title":["Computer Communications and Networks","Guide to Vulnerability Analysis for Computer Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92624-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T21:09:50Z","timestamp":1751836190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92624-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319926230","9783319926247"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92624-7_7","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2018]]}}}