{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:48:53Z","timestamp":1742964533355,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540727378"},{"type":"electronic","value":"9783540727385"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72738-5_5","type":"book-chapter","created":{"date-parts":[[2007,6,23]],"date-time":"2007-06-23T00:36:01Z","timestamp":1182558961000},"page":"65-86","source":"Crossref","is-referenced-by-count":2,"title":["An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme"],"prefix":"10.1007","author":[{"given":"Liang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Horton","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"NuSMV: a new symbolic model checker, http:\/\/nusmv.irst.itc.it\/"},{"key":"5_CR2","volume-title":"Proceedings of International Conference on Research and Development in Information Retrieval (SIGIR 2001)","author":"A.Y. Ng","year":"2001","unstructured":"Ng, A.Y., Zheng, A.X., Jordan, M.I.: Link analysis, eigenvectors and stability. In: Proceedings of International Conference on Research and Development in Information Retrieval (SIGIR 2001), ACM Press, New York (2001)"},{"key":"5_CR3","unstructured":"AT&T Research, http:\/\/www.graphviz.org\/"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Madan, B.B., Popstojanova, K.G., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. In: Dependable Systems and Networks-Performance and Dependability Symposium, pp. 167\u2013186 (2004)","DOI":"10.1016\/j.peva.2003.07.008"},{"key":"5_CR5","unstructured":"Phillips, C.A., Swiler, L.P.: A graph based system for network vulnerability analysis. In: Proceedings of the DARPA Information Survivability Conference and Exposition (2000)"},{"key":"5_CR6","volume-title":"Matrix computation","author":"G.H. Golub","year":"1993","unstructured":"Golub, G.H., Loan, V.: Matrix computation. The Johns Hopkins University Press, Baltimore (1993)"},{"key":"5_CR7","unstructured":"Dawkins, J., Hale, J.: A systematic approach to multi-stage network attack analysis. In: Proceedings of the Second IEEE International Information Assurance Workshop (2004)"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1052934.1052938","volume":"5","author":"M. Bianchini","year":"2001","unstructured":"Bianchini, M., Gori, M., Scarsell, F.: Inside PageRank. ACM Transactions on Internet Technology\u00a05(1), 92\u2013118 (2001)","journal-title":"ACM Transactions on Internet Technology"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Dacier, M., Deswarte, Y., Kaaniche, M.: Quantitative assessment of operational security: Models and tools. Technical Report 96493, LAAS (May 1996)","DOI":"10.1007\/978-1-5041-2919-0_15"},{"key":"5_CR10","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)"},{"issue":"5","key":"5_CR11","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/32.815323","volume":"25","author":"Y. Deswarte","year":"1999","unstructured":"Deswarte, Y., Ortalo, R., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. Software Engineering\u00a025(5), 633\u2013650 (1999)","journal-title":"Software Engineering"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Ortalo, R., Deshwarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 71\u201379 (1999)","DOI":"10.1109\/32.815323"},{"key":"5_CR13","unstructured":"Brin, S., Page, L., Motwani, R., Winograd, T.: The PageRank citation ranking: Bringing order to the Web. Technical Report 1999-66, Standford University (1999)"},{"key":"5_CR14","unstructured":"Jha, S., Wing, J.: Survivability analysis of networked systems. In: 23rd International Conference on Software Engineering(ICSE\u201901), pp. 307\u2013317 (2001)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/CSFW.2002.1021806","volume-title":"15th IEEE Computer Security Foundations Workshop (CSFW\u201902)","author":"S. Jha","year":"2002","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two Formal Analysis of Attack Graphs. In: 15th IEEE Computer Security Foundations Workshop (CSFW\u201902), p. 49. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11856214_7","volume-title":"Recent Advances in Intrusion Detection","author":"V. Mehta","year":"2006","unstructured":"Mehta, V., Bartzis, C., Zhu, H., Clarke, E., Wing, J.M.: Ranking Attack Graphs. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 127\u2013144. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72738-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T13:23:15Z","timestamp":1683897795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72738-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540727378","9783540727385"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72738-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}