{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:23Z","timestamp":1725560903808},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_3","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"27-41","source":"Crossref","is-referenced-by-count":2,"title":["A Role of DEVS Simulation for Information Assurance"],"prefix":"10.1007","author":[{"given":"Sung-Do","family":"Chi","sequence":"first","affiliation":[]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jang-Se","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Longstaff, T.A., Chittister, C., Pethia, R., Haimes, Y.Y.: Are We Forgetting the Risks of Information Technology. IEEE Computer, 43\u201351 (2000)","DOI":"10.1109\/2.889092"},{"key":"3_CR2","unstructured":"Ye, N., Hosmer, C., Giordano, J., Feldman, J.: Critical Information Infrastructure Protection through Process Modeling and Model-based Information Fusion. In: Proc. the Information Survivability Workshop (1998)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Jones, A.: The challenge of building survivable information-intensive systems. IEEE Computer, 39\u201343 (2000)","DOI":"10.1109\/MC.2000.863966"},{"key":"3_CR4","unstructured":"DoD. Defensive Information Operations. Technical Report #6510.01B (1997)"},{"key":"3_CR5","unstructured":"Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. In: Proc IEEE Symposium on Security and Privacy Special 20th Anniversary Program. Berkeley, CA (1999)"},{"key":"3_CR6","unstructured":"Amoroso, E.: Intrusion Detection. AT&T Laboratory: Intrusion Net Books (1999)"},{"key":"3_CR7","volume-title":"The Process of Network Security","author":"T.A. Wadlow","year":"2000","unstructured":"Wadlow, T.A.: The Process of Network Security. Addison-Wesley, Reading (2000)"},{"key":"3_CR8","unstructured":"Ye, N., Giordano, J.: CACS - A Process Control Approach to Cyber Attack Detection. Communications of the ACM"},{"key":"3_CR9","unstructured":"Lee, J.-S., Jeong, J.-R., Chi, S.-D., Park, J.S.: Simulation-based Vulnerability Analysis. Computer Systems Science & Engineering (submitted)"},{"key":"3_CR10","volume-title":"Object-oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic systems","author":"B.P. Zeigler","year":"1990","unstructured":"Zeigler, B.P.: Object-oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic systems. Academic Press, London (1990)"},{"key":"3_CR11","volume-title":"Theory of Modeling and Simulation","author":"B.P. Zeigler","year":"1999","unstructured":"Zeigler, B.P., Praehofer, H., Kim, T.G.: Theory of Modeling and Simulation, 2nd edn. Academic Press, London (1999)","edition":"2"},{"key":"3_CR12","volume-title":"Multifacetted Modeling and Discrete Event Simulation","author":"B.P. Zeigler","year":"1984","unstructured":"Zeigler, B.P.: Multifacetted Modeling and Discrete Event Simulation. Academic Press, London (1984)"},{"issue":"3","key":"3_CR13","first-page":"141","volume":"14","author":"S.D. Chi","year":"1996","unstructured":"Chi, S.D.: Model-Based Reasoning Methodology Using the Symbolic DEVS Simulation. Trans. of the Society for Computer Simulation International\u00a014(3), 141\u2013151 (1996)","journal-title":"Trans. of the Society for Computer Simulation International"},{"issue":"6","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1109\/21.199467","volume":"22","author":"B.P. Zeigler","year":"1992","unstructured":"Zeigler, B.P., Chi, S.D.: Symbolic Discrete Event System Specification. IEEE Trans. on System, Man, and Cybernetics\u00a022(6), 1428\u20131443 (1992)","journal-title":"IEEE Trans. on System, Man, and Cybernetics"},{"key":"3_CR15","unstructured":"Chi, S.D., et al.: Automated Cyber-Attack Scenario Generation Using the Symbolic Simulation. Trans. of the Society for Computer Simulation International (submitted)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-47719-5_26","volume-title":"Information Security and Privacy","author":"S.D. Chi","year":"2001","unstructured":"Chi, S.D., et al.: Network Security Modeling and Cyber-attack Simulation Methodology. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, p. 320. Springer, Heidelberg (2001)"},{"key":"3_CR17","unstructured":"Chi, S.D., et al.: SECUSIM: A Tool for the Cyber-Attack Simulation. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T09:35:25Z","timestamp":1552815325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}