{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:15:01Z","timestamp":1769922901972,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642008429","type":"print"},{"value":"9783642008436","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_30","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T14:42:08Z","timestamp":1238596928000},"page":"345-359","source":"Crossref","is-referenced-by-count":16,"title":["Ranking Attack Graphs with Graph Neural Networks"],"prefix":"10.1007","author":[{"given":"Liang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Hagenbuchner","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Horton","sequence":"additional","affiliation":[]},{"given":"Sweah Liang","family":"Yong","sequence":"additional","affiliation":[]},{"given":"Ah Chung","family":"Tsoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Bhadeshia, University Of Cambridge. Neural Networks in Materials Science"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Mizutani, E., Dreyfus, S.E.: On complexity analysis of supervised MLP-learning for algorithmic comparisons. In: International Joint Conference on Neural Networks (IJCNN), vol.\u00a01 (2001)","DOI":"10.1109\/IJCNN.2001.939044"},{"key":"30_CR3","unstructured":"Scarselli, F., Tsoi, A.C., Gori, M., Hagenbuchner, M.: A new neural network model for graph processing. Technical Report DII 1\/05, University of Siena (August 2005)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Scarselli, F., Yong, S.L., Hagenbuchner, M., Tsoi, A.C.: Adaptive Page Ranking with Neural Networks. In: WWW (Special interest tracks and posters), pp. 936\u2013937 (2005)","DOI":"10.1145\/1062745.1062806"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Frasconi, P., Gori, M., Sperduti, A.: A general framework for adaptive processing of data structures\u00a09(5), 768\u2013786 (September 1998)","DOI":"10.1109\/72.712151"},{"key":"30_CR6","unstructured":"Haykin, S.: Neural Networks, A Comprehensive Foundation. Macmillan College Publishing Company, Inc., 866 Third Avenue, New York, 10022 (1994)"},{"issue":"5","key":"30_CR7","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K. Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Networks\u00a02(5), 359\u2013366 (1989)","journal-title":"Neural Networks"},{"issue":"2","key":"30_CR8","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/BF00197942","volume":"7","author":"R.A. Kemmerer","year":"1994","unstructured":"Kemmerer, R.A., Catherine, M., Millen, J.K.: Three system for cryptographic protocol analysis. Cryptology\u00a07(2), 79\u2013130 (1994)","journal-title":"Cryptology"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-72738-5_5","volume-title":"Applied Cryptography and Network Security","author":"L. Lu","year":"2007","unstructured":"Lu, L., Safavi-Naini, R., Horton, J., Susilo, W.: An adversary aware and intrusion detection aware attack model ranking scheme. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 65\u201386. Springer, Heidelberg (2007)"},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1052934.1052938","volume":"5","author":"M. Bianchini","year":"2001","unstructured":"Bianchini, M., Gori, M., Scarselli, F.: Inside PageRank. ACM Transactions on Internet Technology\u00a05(1), 92\u2013118 (2001)","journal-title":"ACM Transactions on Internet Technology"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TNN.2008.2005141","volume":"20","author":"F. Scarselli","year":"2009","unstructured":"Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: Computational capabilities of graph neural networks. IEEE Transactions on Neural Networks\u00a020(1), 81\u2013102 (2009)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Scarselli, F., Yong, S.L., Gori, M., Hagenbuchner, M., Tsoi, A.C., Maggini, M.: Graph neural networks for ranking web pages. In: Web Intelligence Conference, pp. 666\u2013672 (2005)","DOI":"10.1109\/WI.2005.67"},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/1183463.1183466","volume":"6","author":"A.C. Tsoi","year":"2006","unstructured":"Tsoi, A.C., Hagenbuchner, M., Scarselli, F.: Computing customized page ranks. ACM Transactions on Internet Technology\u00a06(4), 381\u2013414 (2006)","journal-title":"ACM Transactions on Internet Technology"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11856214_7","volume-title":"Recent Advances in Intrusion Detection","author":"V. Mehta","year":"2006","unstructured":"Mehta, V., Bartzis, C., Zhu, H., Clarke, E., Wing, J.M.: Ranking attack graphs. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 127\u2013144. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T06:56:55Z","timestamp":1589698615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}