{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:48:32Z","timestamp":1760597312748},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540769279"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76929-3_20","type":"book-chapter","created":{"date-parts":[[2007,11,17]],"date-time":"2007-11-17T03:01:14Z","timestamp":1195268474000},"page":"212-227","source":"Crossref","is-referenced-by-count":16,"title":["A Logical Framework for Evaluating Network Resilience Against Faults and Attacks"],"prefix":"10.1007","author":[{"given":"Elie","family":"Bursztein","sequence":"first","affiliation":[]},{"given":"Jean","family":"Goubault-Larrecq","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"20_CR1","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/585265.585270","volume":"49","author":"R. Alur","year":"2002","unstructured":"Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. J. ACM\u00a049(5), 672\u2013713 (2002)","journal-title":"J. ACM"},{"key":"20_CR2","unstructured":"Artz, M.: NetSPA : a Network Security Planning Architecture. PhD thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science (2002)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer viruses. science\u00a0304(23) (2004)","DOI":"10.1126\/science.1095845"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"T. Brihaye","year":"2006","unstructured":"Brihaye, T., Henzinger, T.A., Raskin, J., Prabhu, V.: Minimum-time reachability in timed games. In: Asarin, E., Bouyer, P. (eds.) FORMATS 2006. LNCS, vol.\u00a04202, Springer, Heidelberg (2006)"},{"key":"20_CR5","unstructured":"Church, A.: logic, arithmetics and automata. In: Congress of Mathematician, Institut Mittag-Leffler, pp. 23\u201335 (1962)"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11538-006-9077-9","volume":"68","author":"V. Colizza","year":"2006","unstructured":"Colizza, V., Barrat, A., Barthelemy, M., Vespignani, A.: The modeling of global epidemics: stochastic dynamics and predictability. Bulletin of Mathematical Biology\u00a068, 1893\u20131921 (2006)","journal-title":"Bulletin of Mathematical Biology"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"CONCUR 2003 - Concurrency Theory","author":"L. Alfaro de","year":"2003","unstructured":"de Alfaro, L., Faella, M., Henzinger, T., Majumdar, R., Stoelinga, M.: The element of surprise in timed games. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol.\u00a02761, Springer, Heidelberg (2003)"},{"key":"20_CR8","unstructured":"du net, J.: Bouygues telecom priv\u00e9 de r\u00e9seau (2004)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11867340_1","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"T. Henzinger","year":"2006","unstructured":"Henzinger, T., Prabhu, V.: Timed alternating-time temporal logic. In: Asarin, E., Bouyer, P. (eds.) FORMATS 2006. LNCS, vol.\u00a04202, pp. 1\u201318. Springer, Heidelberg (2006)"},{"key":"20_CR10","unstructured":"ICANN. Dns attack factsheet. Technical report, ICANN (March 2007)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1229285.1229288","volume-title":"ASIACCS 2007","author":"S. Jajodia","year":"2007","unstructured":"Jajodia, S.: Topological analysis of network attack vulnerability. In: ASIACCS 2007. Proceedings of the 2nd ACM symposium on Information, computer and communications security, Singapore, p. 2. ACM Press, New York (2007)"},{"key":"20_CR12","first-page":"49","volume-title":"CSFW 2002","author":"S. Jha","year":"2002","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analysis of attack graphs. In: CSFW 2002. Proceedings of the 15th IEEE Computer Security Foundations Workshop, Washington, DC, USA, p. 49. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Klensin, J.: Rfc 2821 - simple mail transfer protocol. Technical report, IETF Network Working Group (2001)","DOI":"10.17487\/rfc2821"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36084-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2002","unstructured":"Lippmann, R., Webster, S., Stetson, D.: The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, Springer, Heidelberg (2002)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Maler, O., Pnueli, A., Sifakis, J.: On the synthesis of discrete controllers for timed systems (extended abstract). In: STACS 1995, pp. 229\u2013242 (1995)","DOI":"10.1007\/3-540-59042-0_76"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/75277.75293","volume-title":"POPL 1989","author":"A. Pnueli","year":"1989","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: POPL 1989. Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, Austin, Texas, United States, pp. 179\u2013190. ACM Press, New York (1989)"},{"key":"20_CR17","first-page":"156","volume-title":"SP 2000","author":"R.W. Ritchey","year":"2000","unstructured":"Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: SP 2000. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 156. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"20_CR18","first-page":"378","volume-title":"ICAC 2005","author":"F. Saffre","year":"2005","unstructured":"Saffre, F., Halloy, J., Deneubourg, J.L.: The ecology of the grid. In: ICAC 2005. Proceedings of the Second International Conference on Automatic Computing, Washington, DC, USA, pp. 378\u2013379. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"20_CR19","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb?s journal (December 1999)"},{"key":"20_CR20","volume-title":"Secrets & Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, Chichester (2000)"},{"key":"20_CR21","first-page":"61","volume":"00","author":"M.M. Williamson","year":"2002","unstructured":"Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. acsac\u00a000: 61 (2002)","journal-title":"acsac"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76929-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:47:59Z","timestamp":1619520479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76929-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540769279"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76929-3_20","relation":{},"subject":[]}}