{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:28:49Z","timestamp":1763479729508,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_18","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:25:17Z","timestamp":1251962717000},"page":"218-233","source":"Crossref","is-referenced-by-count":16,"title":["Towards Unifying Vulnerability Information for Attack Graph Construction"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Roschke","sequence":"first","affiliation":[]},{"given":"Feng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Schuppenies","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats. Journal Dr. Dobb\u2019s Journal (December 1999), \n                    \n                      http:\/\/www.ddj.com\/architect\/184411129"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/SECPRI.2002.1004377","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002)","author":"O. Sheyner","year":"2002","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated Generation and Analysis of Attack Graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), pp. 273\u2013284. IEEE Press, Washington (2002)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1029208.1029225","volume-title":"Proceedings of Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004)","author":"S. Noel","year":"2004","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004), pp. 109\u2013118. ACM, Washington (2004)"},{"key":"18_CR4","first-page":"8","volume-title":"Proceedings of 14th USENIX Security Symposium","author":"X. Ou","year":"2005","unstructured":"Ou, X., Govindavajhala, S., Appel, A.: MulVAL: A Logic-based Network Security Analyzer. In: Proceedings of 14th USENIX Security Symposium, p. 8. USENIX Association, Baltimore (2005)"},{"key":"18_CR5","unstructured":"Secunia Advisories, \n                    \n                      http:\/\/secunia.com\/advisories\/\n                    \n                    \n                   (accessed March 3, 2009)"},{"key":"18_CR6","unstructured":"OSV Database, Open source vulnerability database. OSVDB, \n                    \n                      http:\/\/osvdb.org\/\n                    \n                    \n                   (accessed March 2009)"},{"key":"18_CR7","unstructured":"Mitre Corporation, Common vulnerabilities and exposures. CVE, \n                    \n                      http:\/\/cve.mitre.org\/\n                    \n                    \n                   (accessed March 2009)"},{"key":"18_CR8","unstructured":"Mitre Corporation, Open Vulnerability and Assessment Language, OVAL, \n                    \n                      http:\/\/oval.mitre.org\/\n                    \n                    \n                   (accessed March 3, 2009)"},{"key":"18_CR9","unstructured":"SecurityFocus, Security Focus Bugtraq, \n                    \n                      http:\/\/www.securityfocus.com\/\n                    \n                    \n                   (accessed March 2009)"},{"key":"18_CR10","unstructured":"ISS, X-force, \n                    \n                      http:\/\/xforce.iss.net\/\n                    \n                    \n                   (accessed March 2009)"},{"key":"18_CR11","unstructured":"NIST, National Vulnerability Database, NVD, \n                    \n                      http:\/\/nvd.nist.gov\/\n                    \n                    \n                   (accessed March 3, 2009)"},{"key":"18_CR12","unstructured":"US CERT, US-CERT vulnerability notes database, \n                    \n                      http:\/\/www.kb.cert.org\/vuls\/\n                    \n                    \n                   (accessed March 2009)"},{"key":"18_CR13","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0 (2007), \n                    \n                      http:\/\/www.first.org\/cvss\/\n                    \n                    \n                   (accessed March 3, 2009)"},{"key":"18_CR14","unstructured":"Mitre Corporation, CVE-2008-4250 (accessed March 2009)"},{"key":"18_CR15","unstructured":"Franqueira, V.N.L., van Keulen, M.: Analysis of the nist database towards the composition of vulnerabilities in attack scenarios. Technical Report TR-CTIT-08-08, University of Twente, Enschede (February 2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:29:11Z","timestamp":1558268951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}