{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:03:29Z","timestamp":1767337409264},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_7","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"86-101","source":"Crossref","is-referenced-by-count":17,"title":["Attack and Defense Modeling with BDMP"],"prefix":"10.1007","author":[{"given":"Ludovic","family":"Pi\u00e8tre-Cambac\u00e9d\u00e8s","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Bouissou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","first-page":"15","volume-title":"Fundamentals of computer security technology, ch. 2","author":"E.G. Amoroso","year":"1994","unstructured":"Amoroso, E.G.: Threat Trees. In: Fundamentals of computer security technology, ch. 2, pp. 15\u201329. Prentice-Hall Inc., Englewood Cliffs (1994)"},{"key":"7_CR2","unstructured":"Bouissou, M.: Automated dependability analysis of complex systems with the KB3 workbench: the experience of EDF R&D. In: Proc. International Conference on Energy and Environment (CIEM 2005), Bucharest, Romania (October 2005)"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0951-8320(03)00143-1","volume":"82","author":"M. Bouissou","year":"2003","unstructured":"Bouissou, M., Bon, J.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Reliability Engineering & System Safety\u00a082(2), 149\u2013163 (2003)","journal-title":"Reliability Engineering & System Safety"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bouissou, M., Lefebvre, Y.: A path-based algorithm to evaluate asymptotic unavailability for large Markov models. In: Proc. Reliability and Maintainability Annual Symposium (RAMS 2002), Seattle, USA, pp. 32\u201339 (2002)","DOI":"10.1109\/RAMS.2002.981616"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.2307\/3214596","volume":"27","author":"P. Harrison","year":"1990","unstructured":"Harrison, P.: Laplace transform inversion and passage time distributions in Markov processes. Journal of applied probability\u00a027(1), 74\u201387 (1990)","journal-title":"Journal of applied probability"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/32.588541","volume":"23","author":"E. Jonsson","year":"1997","unstructured":"Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Soft. Engineering\u00a023(4), 235\u2013245 (1997)","journal-title":"IEEE Trans. Soft. Engineering"},{"issue":"6","key":"7_CR7","first-page":"226","volume":"6","author":"I. Kotenko","year":"2006","unstructured":"Kotenko, I., Stepashkin, M.: Analyzing network security using malefactor action graphs. Int. Journal of Comp. Science and Network Security\u00a06(6), 226\u2013236 (2006)","journal-title":"Int. Journal of Comp. Science and Network Security"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Ingols, K.: An annotated review of past papers on attack graphs. Project Report ESC-TR-2005-054, Massachusetts Institute of Technology (MIT), Lincoln Laboratory (March 2005)","DOI":"10.21236\/ADA431826"},{"key":"7_CR9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J., Gollmann, D.: Towards operational measures of computer security. Journal of Computer Security\u00a02, 211\u2013229 (1993)","journal-title":"Journal of Computer Security"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S. Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"McDermott, J.P.: Attack net penetration testing. In: Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Ireland, pp. 15\u201321 (2000)","DOI":"10.1145\/366173.366183"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: From dependability to security. IEEE Trans. Dependable and Secure Comp.\u00a01(1), 48\u201365 (2004)","journal-title":"IEEE Trans. Dependable and Secure Comp."},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TR.2003.809657","volume":"52","author":"Y. Ou","year":"2003","unstructured":"Ou, Y., Dugan, J.B.: Approximate sensitivity analysis for acyclic Markov reliability models. IEEE Transactions on Reliability\u00a052(2), 220\u2013230 (2003)","journal-title":"IEEE Transactions on Reliability"},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.ijinfomgt.2008.01.009","volume":"28","author":"S.C. Patel","year":"2008","unstructured":"Patel, S.C., Graham, J.H., Ralston, P.A.: Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. Int. Journal of Information Management\u00a028(6), 483\u2013491 (2008)","journal-title":"Int. Journal of Information Management"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Attack and defense dynamic modeling with BDMP (extended version). Technical Report, Telecom ParisTech, D\u00e9partement INFRES (2010)","DOI":"10.1007\/978-3-642-14706-7_7"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic Driven Markov Processes (BDMP). In: Proc. 8th European Dependable Computing Conference (EDCC), Valencia, Spain, pp. 119\u2013208 (April 2010)","DOI":"10.1109\/EDCC.2010.32"},{"key":"7_CR17","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Chaudet, C.: Disentangling the relations between safety and security. In: Proc. of the 9th WSEAS Int. Conf. on Applied Informatics and Communications (AIC 2009), WSEAS, Moscow, Russia (August 2009)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Pudar, S., Manimaran, G., Liu, C.: PENET: a practical method and tool for integrated modeling of security attacks and countermeasures. Computers & Security In Press, Corrected Proof (May 2009)","DOI":"10.1016\/j.cose.2009.05.007"},{"key":"7_CR19","volume-title":"System Reliability Theory: Models and Statistical Methods","author":"M. Rausand","year":"2004","unstructured":"Rausand, M., H\u00f8yland, A.: System Reliability Theory: Models and Statistical Methods, 2nd edn. Wiley, Chichester (2004)","edition":"2"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Sallhammar, K.: Stochastic models for combined security and dependability evaluation. Ph.D. thesis, Norwegian University of Science and Technology NTNU (2007)","DOI":"10.1109\/ARES.2006.137"},{"issue":"24","key":"7_CR21","first-page":"21","volume":"12","author":"B. Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb\u2019s Journal\u00a012(24), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s Journal"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proc. IEEE Symposium on Security and Privacy (S&P 2002), Oakland, USA, pp. 273\u2013284 (May 2002)","DOI":"10.1109\/SECPRI.2002.1004377"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:37Z","timestamp":1606186597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}