{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:00:53Z","timestamp":1725570053634},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163418"},{"type":"electronic","value":"9783642163425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16342-5_24","type":"book-chapter","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T12:29:50Z","timestamp":1289910590000},"page":"324-336","source":"Crossref","is-referenced-by-count":3,"title":["Remodeling Vulnerability Information"],"prefix":"10.1007","author":[{"given":"Feng","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Roschke","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Schuppenies","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"CERT Vulnerability Analysis Blog, \n                    \n                      http:\/\/www.cert.org\/blogs\/vuls\/\n                    \n                    \n                   (accessed August 2009)"},{"key":"24_CR2","unstructured":"CVE Website, \n                    \n                      http:\/\/cve.mitre.org\/\n                    \n                    \n                   (accessed August 2009)"},{"key":"24_CR3","unstructured":"OVAL Website, \n                    \n                      http:\/\/oval.mitre.org\/\n                    \n                    \n                   (accessed August 2009)"},{"key":"24_CR4","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System, Version 2.0. Technical Report, FIRST (June 2007)"},{"key":"24_CR5","unstructured":"Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, Internet Draft. Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004)"},{"key":"24_CR6","unstructured":"Martin, R.A.: Transformational Vulnerability Management Through Standards Technical Report, MITRE Corporation (May 2005)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-04474-8_18","volume-title":"Information Security","author":"S. Roschke","year":"2009","unstructured":"Roschke, S., Cheng, F., Schuppenies, R., Meinel, C.: Towards Unifying Vulnerability Information for Attack Graph Construction. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 218\u2013233. Springer, Heidelberg (2009)"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/310889.310919","volume-title":"Proceedings of the 1998 Workshop on New Security Paradigms (NSPW 1998)","author":"C. Phillips","year":"1998","unstructured":"Phillips, C., Swiler, L.P.: A Graph-based System for Network-Vulnerability Analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms (NSPW 1998), pp. 71\u201379. ACM Press, New York (September 1998)"},{"key":"24_CR9","unstructured":"Sheyner, O.M.: Scenario Graphs and Attack Graphs. PhD Thesis, CMU-CS-04-122, Carnegie Mellon University, USA (April 2004)"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/9789812836243_0013","volume-title":"Book Algorithms, Architectures, and Information Systems Security","author":"S. Jajodia","year":"2008","unstructured":"Jajodia, S., Noel, S.: Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response. In: Book Algorithms, Architectures, and Information Systems Security, pp. 285\u2013306. World Scientific Press, Singapore (November 2008)"},{"key":"24_CR11","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats. Journal Dr. Dobb\u2019s Journal, \n                    \n                      http:\/\/www.ddj.com\/architect\/184411129\n                    \n                    \n                   (December 1999)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/366173.366187","volume-title":"Proceedings of the 2000 Workshop on New Security Paradigms (NSPW 2000)","author":"S.J. Templeton","year":"2000","unstructured":"Templeton, S.J., Levitt, K.: A Requires\/Provides Model for Computer Attacks. In: Proceedings of the 2000 Workshop on New Security Paradigms (NSPW 2000), pp. 31\u201338. ACM Press, Ballycotton (September 2000)"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"F. Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: LAMBDA: A Language to Model a Database for Detection of Attacks. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 197\u2013216. Springer, Heidelberg (2000)"},{"key":"24_CR14","first-page":"54","volume-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (IAS 2000)","author":"J. Hale","year":"2001","unstructured":"Hale, J., Tidwell, T., Larson, R., Fitch, K.: Modeling Internet Attacks. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (IAS 2000), pp. 54\u201359. IEEE Press, West Point (June 2001)"},{"key":"24_CR15","first-page":"8","volume-title":"Proceedings of the 14th Usenix Security Symposium (SSYM 2005)","author":"X. Ou","year":"2005","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A Logic-based Network Security Analyzer. In: Proceedings of the 14th Usenix Security Symposium (SSYM 2005), p. 8. USENIX Association, Berkeley (August 2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16342-5_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:26:30Z","timestamp":1619785590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16342-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163418","9783642163425"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16342-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}