{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:17Z","timestamp":1725574397659},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_61","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T20:51:21Z","timestamp":1294433481000},"page":"490-497","source":"Crossref","is-referenced-by-count":0,"title":["Research on a Quantitative Security Risk Assessment Approach in Large-Scale Early Warning System"],"prefix":"10.1007","author":[{"given":"Lei","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Xin","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","unstructured":"Sandia National Laboratories: Us Infrastructure Assurance Strategic Roadmaps \u2013 Strategies For Preserving Our National Security (August 1998)"},{"key":"61_CR2","unstructured":"The International Organization for Standardization: Common Criteria for Information Technology Security Evaluation. ISO\/IEC15408: 1999(E) (1999)"},{"key":"61_CR3","unstructured":"SSE-CMM Model Description Document Version 2.0 (1999), http:\/\/www.sse-cmm.org"},{"key":"61_CR4","unstructured":"International Organization for Standardization: BS ISO\/IEC 17799:2000 Information Technology \u2013 Code of Practice for Information Security Management (December 2000)"},{"key":"61_CR5","unstructured":"BSI\/DISC Committee BDD\/2: BS7799 Code of Practice for Information Security Management (1999)"},{"key":"61_CR6","unstructured":"International Organization for Standardization: ISO\/IEC TR 13335, Information Technology \u2013 Guidelines for the Management of IT Security (GMITS) (1996-2001)"},{"key":"61_CR7","unstructured":"National Security Agency: Information Assurance Technical Framework (IATF), Version 3.0 (2000), http:\/\/www.iatf.net"},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology (NIST). NIST Special Publication 800-30 (October 2001)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Alberts, C.J., Dorofee, A.J.: OCTAVESM Method Implementation Guide, v2.0. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University (2001)","DOI":"10.21236\/ADA634140"},{"key":"61_CR10","unstructured":"C&A Systems Security Ltd.: COBRA: Introduction to Risk Analysis, http:\/\/www.ca-systems.zetnet.co.uk\/risk.htm"},{"key":"61_CR11","unstructured":"Rathmell, A., Overill, R., Valeri, L.: Information Warfare Attack Assessment System (IWAAS). Information Warfare Seminar. London (October 1997)"},{"issue":"1","key":"61_CR12","first-page":"1","volume":"27","author":"X. Xujia","year":"2004","unstructured":"Xujia, X., Chuang, L., Yixin, J.: A Survey of Computer Vulnerability Assessment. Chinese Journal of Computers\u00a027(1), 1\u201311 (2004)","journal-title":"Chinese Journal of Computers"},{"key":"61_CR13","unstructured":"Butler, S.A.: Security Attribute Evaluation Method. CMU-CS-03-132. Submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy. School of Computer Science Carnegie Mellon University, Pittsburgh. PA 15213 (May 2003)"},{"key":"61_CR14","unstructured":"International Information System Security Certification Consortium (ISC)2: Security management, http:\/\/www.os-global.com\/"},{"key":"61_CR15","unstructured":"Tan, D.: Quantitative Risk Analysis Step-By-Step. GSEC Practical Version 1.4b \u2013 Option 1. As part of the Information Security Reading Room. SANS Institute (2003)"},{"key":"61_CR16","doi-asserted-by":"crossref","DOI":"10.1201\/b12444","volume-title":"Information Security Risk Analysis","author":"T.R. Peltier","year":"2001","unstructured":"Peltier, T.R.: Information Security Risk Analysis. Auerbach Publications, New York (2001)"},{"key":"61_CR17","unstructured":"List of Risk Analysis, Assessment and Management Tools (1998), http:\/\/www.theiia.org\/ITAuidit"},{"key":"61_CR18","unstructured":"Meritt, J.W.: CISSP.: A Method for Quantitative Risk Analysis, http:\/\/www.auditnet.org\/docs\/riskmeth.PDF"},{"key":"61_CR19","unstructured":"Qing, M.: Characteristic Information Fusion Method on Network Security Strategic Indication\/ Warning System. Computer Engineering\u00a028(7) (2002)"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_61.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:48:51Z","timestamp":1605761331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}