{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:49:42Z","timestamp":1725529782965},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642010033"},{"type":"electronic","value":"9783642010040"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01004-0_11","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T11:03:02Z","timestamp":1238065382000},"page":"200-214","source":"Crossref","is-referenced-by-count":1,"title":["A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior"],"prefix":"10.1007","author":[{"given":"Jaafar","family":"Almasizadeh","sequence":"first","affiliation":[]},{"given":"Mohammad Abdollahi","family":"Azgomi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transaction on Dependable and Secure Computing\u00a01 (2004)","DOI":"10.1109\/TDSC.2004.2"},{"key":"11_CR2","series-title":"Electronic Notes in Theoretical Computer Science","first-page":"65","volume-title":"Proc. of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004)","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Curti, M., Degano, P.: A Quantitative Study of Two Attacks. In: Proc. of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004). Electronic Notes in Theoretical Computer Science, vol.\u00a0121, pp. 65\u201385. Elsevier, Amsterdam (2005)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Y., Sun, H., Trivedi, K.S., Han, J.: System Availability With Non-Exponentially Distributed Outages. IEEE Transaction on Reliability\u00a051(2) (2002)","DOI":"10.1109\/TR.2002.1011525"},{"key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0471791571","volume-title":"Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Application","author":"G. Bolch","year":"2006","unstructured":"Bolch, G., Greiner, S., de Meer, H., Trivedi, K.S.: Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Application, 2nd edn. John Wiley & Sons, Chichester (2006)","edition":"2"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Go\u0161eva-Popstojanova, K., et al.: Characterizing Intrusion Tolerant Systems Using a State Transition Model. In: DARPA Information Survivability Conference and Exposition (DISCEX II), vol.\u00a02, pp. 211\u2013221 (2001)","DOI":"10.1109\/DISCEX.2001.932173"},{"key":"11_CR6","unstructured":"Houmb, S.H., Sallahammar, K.: Modeling System Integrity of a Security Critical Using Coloured Petri Nets. In: Proc. of the 1st International Conference on Safety and Security Engineering, Rome, Italy, June 13-15 (2005)"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/32.588541","volume":"23","author":"E. Jonsson","year":"1997","unstructured":"Jonsson, E., Olovsson, T.: A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. IEEE Trans. of Software Engineering\u00a023(4), 235\u2013245 (1997)","journal-title":"IEEE Trans. of Software Engineering"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Jonsson, E.: Towards an Integrated Conceptual Model of Security and Dependability. In: Proc. of the First International Conference on Availability, Reliability and Security (AReS) (2006)","DOI":"10.1109\/ARES.2006.138"},{"key":"11_CR9","unstructured":"Ka\u00e2niche, M., Alata, E., Nicomette, V., Deswarte, Y., Dacier, M.: Empirical Analysis and Statistical Modelling of Attack Processes Based on Honeypots. In: Proc. of Workshop on Empirical Evaluation of Dependability and Security (WEEDS 2006), Philadelphia, USA, June 25\u201328 (2006)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., et al.: Towards Operational Measures of Computer Security. Journal of Computer Security\u00a02, 211\u2013229 (1993)","journal-title":"Journal of Computer Security"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems. Performance Evaluation\u00a056 (2004)","DOI":"10.1016\/j.peva.2003.07.008"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Malhotra, S., Bhattacharya, S., Ghosh, S.K.: A Vulnerability and Exploit Independent Approach for Attack Path Prediction. In: Proc. of IEEE 8th International Conference on Computer and Information Technology Workshops (2008)","DOI":"10.1109\/CIT.2008.Workshops.73"},{"key":"11_CR13","unstructured":"McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.: Time-to-Compromise Model for Cyber Risk Reduction Estimation. In: Proc. of Quality of Protection Workshop (2005)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-Based Evaluation: From Dependability to Security. IEEE Trans. on Dependable and Secure Computing\u00a01(1), 48\u201365 (2004)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Ortalo, R., et al.: Experiments with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Transaction on Software Engineering\u00a025(5) (1999)","DOI":"10.1109\/32.815323"},{"key":"11_CR16","unstructured":"Sallhamar, K.: Stochastic Models for Combined Security and Dependability Evaluation. Ph.D. Thesis, Norwegian University of Science and Technology (2007)"},{"key":"11_CR17","unstructured":"Sallhammar, K., Knapskog, S.J.: Using Game Theory in Stochastic Models for Quantifying Security. In: Proc. of the 9th Nordic Workshop on Secure IT-Systems (NordSec 2004), Espoo, Finland, November 4-5 (2004)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Sallhammar, K., Helvik, B.E., Knapskog, S.J.: On Stochastic Modeling for Integrated Security and Dependability Evaluation. Journal of Networks\u00a01(5) (2006)","DOI":"10.4304\/jnw.1.5.31-42"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Sallhammar, K., Knapskog, S.J., Helvik: Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. In: Proc. of the 2005 International Symposium on Applications and the Internet Workshops (Saint 2005) (2005)","DOI":"10.1109\/SAINTW.2005.1619988"},{"key":"11_CR20","unstructured":"Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R., Movaghar, A.: Modeling and Verification of Complex Network Attacks Using an Actor-Based Language. In: Proc. the 11th International CSI Computer Conference (CSICC 2006), January 24-26 (2006)"},{"key":"11_CR21","unstructured":"Singh, S., Cukier, M., Sanders, W.: Probabilistic Validation of an Intrusion-Tolerant Replication System. In: Proc. of the 2003 International Conference on Dependable Systems and Networks (DSN 2003) (2001)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Steven, J., Templeton, K.L.: A Requires\/Provides Model for Computer Attacks. In: Proc. of the 2000 Workshop on New Security Paradigms, Ballycotton, County Cork, Ireland, pp. 31\u201338 (2001)","DOI":"10.1145\/366173.366187"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Stevens, F., Courtney, T., Singh, S., Agbaria, A., Meyer, J.F., Sanders, W.H., Pal, P.: Model-Based Validation of an Intrusion-Tolerant Information System. In: Proc. of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Florianpolis, Brazil (October 2004)","DOI":"10.1109\/RELDIS.2004.1353019"},{"key":"11_CR24","volume-title":"Probability and Statistics with Reliability, Queuing, and Computer Science Applications","author":"K.S. Trivedi","year":"2001","unstructured":"Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons, Chichester (2001)","edition":"2"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Wang, D., Madan, B., Trivedi, K.S.: Security Analysis of SITAR Intrusion-Tolerant System. In: Proc. ACM Workshop on Survivable and Self-Regenerative Systems (2003)","DOI":"10.1145\/1036921.1036924"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01004-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T23:23:37Z","timestamp":1558221817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01004-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010033","9783642010040"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01004-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}