{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:23:46Z","timestamp":1725585826305},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_22","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T07:52:47Z","timestamp":1308124367000},"page":"271-280","source":"Crossref","is-referenced-by-count":2,"title":["On Computing Enterprise IT Risk Metrics"],"prefix":"10.1007","author":[{"given":"Sandeep","family":"Bhatt","sequence":"first","affiliation":[]},{"given":"William","family":"Horne","sequence":"additional","affiliation":[]},{"given":"Prasad","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Common Vulnerability Scoring System, \n                    \n                      http:\/\/www.first.org\/cvss\/cvss-guide.html","key":"22_CR1"},{"unstructured":"Bandhakavi, S., Bhatt, S., Okita, C., Rao, P.: End-to-end network access analysis. In: HP Laboratories Technical Report HPL-2008-28R1. HP Labs (2008)","key":"22_CR2"},{"unstructured":"Forbath, T., Kalaher, P., O\u2019Grady, T.: The total cost of security patch management. Technical report, Wipro Technologies (2005), \n                    \n                      http:\/\/wipro.com\/webpages\/insights\/security_patch_mgmt.htm","key":"22_CR3"},{"key":"22_CR4","volume-title":"ACSAC 2009: Proceedings of the 22nd Annual Computer Security Applications Conference","author":"K. Ingols","year":"2009","unstructured":"Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S.: Modeling modern network attacks and countermeasures using attack graphs. In: ACSAC 2009: Proceedings of the 22nd Annual Computer Security Applications Conference. IEEE Computer Society, Washington, DC, USA (2009)"},{"doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference. IEEE Computer Society, Washington, DC, USA, pp.121\u2013130 (2006)","key":"22_CR5","DOI":"10.1109\/ACSAC.2006.39"},{"doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Optimal ids sensor placement and alert prioritization using attack graphs. Journal of Network and Systems Management 16 (2008)","key":"22_CR6","DOI":"10.1007\/s10922-008-9109-x"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1145\/1180405.1180446","volume-title":"CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security","author":"X. Ou","year":"2006","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336\u2013345. ACM, New York (2006)"},{"key":"22_CR8","volume-title":"2nd ACM Workshop on Quality of Protection","author":"J. Pamula","year":"2006","unstructured":"Pamula, J., Jajodia, S., Ammann, P., Swarup, V.: A weakest-adversary security metric for network configuration security analysis. In: 2nd ACM Workshop on Quality of Protection. ACM Press, New York (2006)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-88313-5_2","volume-title":"Computer Security - ESORICS 2008","author":"R.E. Sawilla","year":"2008","unstructured":"Sawilla, R.E., Ou, X.: Identifying critical attack assets in dependency attack graphs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 18\u201334. Springer, Heidelberg (2008)"},{"key":"22_CR10","volume-title":"Cyber Security and Information Intelligence Research Workshop","author":"A. Singhal","year":"2009","unstructured":"Singhal, A., Ou, X.: Techniques for enterprise network security metrics. In: Cyber Security and Information Intelligence Research Workshop. ACM, New York (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:23:39Z","timestamp":1619774619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_22","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}