{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:54:55Z","timestamp":1725515695743},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705666"},{"type":"electronic","value":"9783540705673"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70567-3_23","type":"book-chapter","created":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T07:57:37Z","timestamp":1216108657000},"page":"297-312","source":"Crossref","is-referenced-by-count":2,"title":["An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Nayot","family":"Poolsappasit","sequence":"additional","affiliation":[]},{"given":"Rinku","family":"Dewri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, pp. 217\u2013224 (November 2002)","DOI":"10.1145\/586110.586140"},{"key":"23_CR2","unstructured":"Dawkins, J., Campbell, C., Hale, J.: Modeling network attacks: Extending the attack tree paradigm. In: Proceedings of the Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection, Baltimore, MD. Johns Hopkins University (June 2002)"},{"key":"23_CR3","volume-title":"Wireless Sensor Networks","author":"J. Elson","year":"2004","unstructured":"Elson, J., Estrin, D.: Sensor networks: A bridge to the physical world. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.) Wireless Sensor Networks. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"23_CR4","unstructured":"Jha, S., Sheyner, O., Wing, J.: Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University (February 2002)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings of the 2002 Computer Security Foundations Workshop, Nova Scotia, pp. 45\u201359 (June 2002)","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. International Journal of Uncertaity, Fuzziness and Knowledge-Based Systems\u00a09(3) (June 2001)","DOI":"10.1016\/S0218-4885(01)00083-1"},{"key":"23_CR7","unstructured":"Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K., McClung, D., Weber, D., Webster, S., Wyschogrod, D., Cunningham, R.K., Zissman, M.: Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, Los Alamitos, CA (January 2000)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information survivability. Technical Note CMU\/SEI-2001-TN-001, Carnegie Melon University \/ Software Engineering Institute (March 2001)","DOI":"10.21236\/ADA387544"},{"issue":"6","key":"23_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communicaqions of the ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communicaqions of the ACM"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 New Security Paradigms Workshop, Chicago, IL, pp. 71\u201379 (January 1998)","DOI":"10.1145\/310889.310919"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Ray, I., Poolsappasit, N.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: Proceedings of the 10th European Symposium on Research in Computer Security, Milan, Italy (September 2005)","DOI":"10.1007\/11555827_14"},{"key":"23_CR12","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb\u2019s Journal (December 1999)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Computer Society Symposium on Security and Privacy, Oakland, CA (May 2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings of DISCEX 2000: DARPA Information Survivability Conference and Exposition II, pp. 307\u2013321 (June 2001)","DOI":"10.1109\/DISCEX.2001.932182"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70567-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:15:37Z","timestamp":1557681337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70567-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705666","9783540705673"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70567-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}