{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:23:53Z","timestamp":1725585833988},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_24","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"293-304","source":"Crossref","is-referenced-by-count":3,"title":["Extending LSCs for Behavioral Signature Modeling"],"prefix":"10.1007","author":[{"given":"Sven","family":"Patzina","sequence":"first","affiliation":[]},{"given":"Lars","family":"Patzina","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Sch\u00fcrr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1011227529550","volume":"19","author":"W. Damm","year":"2001","unstructured":"Damm, W., Harel, D.: LSCs: Breathing Life into Message Sequence Charts. Formal Methods in System Design\u00a019(1), 45\u201380 (2001)","journal-title":"Formal Methods in System Design"},{"key":"24_CR2","unstructured":"Giarratano, J., Riley, G.: Expert Systems: Principles and Programming, 3rd edn. Course Technology (1998)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Groll, A., Ruland, C.: Secure and Authentic Communication on Existing In-Vehicle Networks. In: Proc. of IEEE IV 2009, pp. 1093\u20131097 (2009)","DOI":"10.1109\/IVS.2009.5164434"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-78127-1_19","volume-title":"Pillars of Computer Science","author":"D. Harel","year":"2008","unstructured":"Harel, D., Maoz, S., Segall, I.: Some Results on the Expressive Power and Complexity of LSCs. In: Avron, A., Dershowitz, N., Rabinovich, A. (eds.) Pillars of Computer Science. LNCS, vol.\u00a04800, pp. 351\u2013366. Springer, Heidelberg (2008)"},{"key":"24_CR5","first-page":"8","volume-title":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, ECBS 2006","author":"M. Hussein","year":"2006","unstructured":"Hussein, M., Zulkernine, M.: UMLintr: A UML Profile for Specifying Intrusions. In: 13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, ECBS 2006, pp. 8\u2013288. IEEE, Los Alamitos (2006)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/SP.2010.34","volume-title":"2010 IEEE Symposium on Security and Privacy (SP)","author":"K. Koscher","year":"2010","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental Security Analysis of a Modern Automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE, Los Alamitos (2010)"},{"key":"24_CR8","unstructured":"Kumar, S.: Classification and Detection of Computer Intrusions. Ph.D. thesis, Purdue University (1995)"},{"key":"24_CR9","first-page":"146","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999","author":"U. Lindqvist","year":"2002","unstructured":"Lindqvist, U., Porras, P.: Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, pp. 146\u2013161. IEEE, Los Alamitos (2002)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Massacci, F., Naliuka, K.: Towards Practical Security Monitors of UML Policies for Mobile Applications. In: Proc. of IEEE POLICY 2007, pp. 278 (2007)","DOI":"10.1109\/POLICY.2007.46"},{"issue":"11","key":"24_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P. Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., Buttyan, L., et al.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Commun. Mag.\u00a046(11), 100\u2013109 (2008)","journal-title":"IEEE Commun. Mag."},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Patzina, L., Patzina, S., Piper, T., Sch\u00fcrr, A.: Monitor Petri Nets for Security Monitoring. In: Proc. of S&D4RCES (2010)","DOI":"10.1145\/1868433.1868438"},{"key":"24_CR14","unstructured":"Schmerl, S.: Entwurf und Entwicklung einer effizienten Analyseeinheit f\u00fcr Intrusion-Detection-Systeme. Diplomarbeit, Lehrstuhl Rechnernetze, BTU Cottbus (2004)"},{"key":"24_CR15","unstructured":"Sindre, G., Opdahl, A.L.: Capturing Security Requirments through Misuse Cases. In: NIK 2001 (2001), http:\/\/www.nik.no\/2001"},{"issue":"2","key":"24_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/65.993218","volume":"16","author":"M. Sloman","year":"2002","unstructured":"Sloman, M., Lupu, E.: Security and Management Policy Specification. IEEE Network\u00a016(2), 10\u201319 (2002)","journal-title":"IEEE Network"},{"key":"24_CR17","unstructured":"Smith, S., Beaulieu, A., Phillips, W.G.: Modeling Security Protocols Using UML 2. In: Workshop \u2013 Modeling Security 2008 (2008)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Solhaug, B., Elgesem, D., et al.: Specifying Policies Using UML Sequence Diagrams\u2013An Evaluation Based on a Case Study. In: Proc. of IEEE POLICY 2007, pp. 19\u201328 (2007)","DOI":"10.1109\/POLICY.2007.42"},{"key":"24_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/DISCEX.2000.821508","volume-title":"Proc. of DISCEX 2000, DARPA Information Survivability Conference and Exposition, 2000","author":"G. Vigna","year":"2002","unstructured":"Vigna, G., Eckmann, S., Kemmerer, R.: The STAT Tool Suite. In: Proc. of DISCEX 2000, DARPA Information Survivability Conference and Exposition, 2000, vol.\u00a02, pp. 46\u201355. IEEE, Los Alamitos (2002)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/11693017_18","volume-title":"Fundamental Approaches to Software Engineering","author":"B. Westphal","year":"2006","unstructured":"Westphal, B., Toben, T.: The Good, the Bad and the Ugly: Well-Formedness of Live Sequence Charts. In: Baresi, L., Heckel, R. (eds.) FASE 2006. LNCS, vol.\u00a03922, pp. 230\u2013246. Springer, Heidelberg (2006)"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:03:34Z","timestamp":1606187014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_24","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}