{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:34:15Z","timestamp":1725568455948},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642165573"},{"type":"electronic","value":"9783642165580"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16558-0_8","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:36:49Z","timestamp":1288705009000},"page":"60-74","source":"Crossref","is-referenced-by-count":5,"title":["Analyzing the Security in the GSM Radio Network Using Attack Jungles"],"prefix":"10.1007","author":[{"given":"Parosh Aziz","family":"Abdulla","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Cederberg","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Specification of GERAN vulnerabilities (2007), \n                    \n                      http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33801.htm"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla, P.A., \u010cer\u0101ns, K., Jonsson, B., Tsay, Y.: Algorithmic analysis of programs with well quasi-ordered domains. Inf. Comput.\u00a0160(1-2) (2000)","DOI":"10.1006\/inco.1999.2843"},{"key":"8_CR3","unstructured":"Isograph AttackTree+ (2007), \n                    \n                      http:\/\/www.isograph-software.com\/atpover.htm"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75227-1_1","volume-title":"Formal Aspects in Security and Trust","author":"S. Bistarelli","year":"2007","unstructured":"Bistarelli, S., Dall\u2019Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.\u00a04691, pp. 1\u201315. Springer, Heidelberg (2007)"},{"key":"8_CR5","first-page":"416","volume-title":"ARES 2006","author":"S. Bistarelli","year":"2006","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense tree for economic evaluations of security investment. In: ARES 2006, pp. 416\u2013423. IEEE Computer Society, Los Alamitos (2006)"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.entcs.2007.12.021","volume":"197","author":"S. Bistarelli","year":"2008","unstructured":"Bistarelli, S., Peretti, P., Trubitsyna, I.: Analyzing security scenarios using defence trees and answer set programming. Electronic Notes in Theoretical Computer Science (ENTCS)\u00a0197(2), 121\u2013129 (2008)","journal-title":"Electronic Notes in Theoretical Computer Science (ENTCS)"},{"key":"8_CR7","unstructured":"Brynielsson, J., Horndahl, A., Kaati, L., M\u00e5rtenson, C., Svenson, P.: Development of computerized support tools for intelligence work. In: Proceedings of ICCRTS (2009)"},{"key":"8_CR8","volume-title":"Telecommunications Essentials, Second Edition: The Complete Global Source","author":"L. Goleniewski","year":"2006","unstructured":"Goleniewski, L., Jarrett, K.W.: Telecommunications Essentials, Second Edition: The Complete Global Source, 2nd edn. Addison-Wesley Professional, Reading (2006)","edition":"2"},{"key":"8_CR9","unstructured":"Van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D.: From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. In: Proc. of RHAS 2003, pp. 49\u201356 (2003)"},{"key":"8_CR10","unstructured":"Amenaza Technologies Limited. A quick tour of attack tree based risk analysis using SecureITree (2002)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S. Mauw","year":"2005","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 186\u2013198. Springer, Heidelberg (2005)"},{"key":"8_CR12","unstructured":"Lippmann, R., Sheyner, O., Haines, J., Jha, S., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)"},{"key":"8_CR13","unstructured":"Schneier, B.: Attack trees. Dr Dobbs Journal\u00a024(12) (1999)"},{"key":"8_CR14","series-title":"Sheyner, O., Wing, J.M","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-30101-1_17","volume-title":"Formal Methods for Components and Objects","author":"O. Sheyner","year":"2004","unstructured":"Sheyner, O., Wing, J.M.: Tools for generating and analyzing attack graphs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. Sheyner, O., Wing, J.M, vol.\u00a03188, pp. 344\u2013371. Springer, Heidelberg (2004)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE 2004, pp. 148\u2013157 (2004)","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"8_CR16","volume-title":"Wireless and Cellular Networks","author":"S. Wisniewski","year":"2004","unstructured":"Wisniewski, S.: Wireless and Cellular Networks. Prentice-Hall, Inc., Englewood Cliffs (2004)"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification, and Validation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16558-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T02:10:21Z","timestamp":1553220621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16558-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642165573","9783642165580"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16558-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}