{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:49:07Z","timestamp":1743148147394,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_35","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:22:53Z","timestamp":1309220573000},"page":"403-411","source":"Crossref","is-referenced-by-count":12,"title":["Attack Intention Analysis Model for Network Forensics"],"prefix":"10.1007","author":[{"given":"M.","family":"Rasmi","sequence":"first","affiliation":[]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Yasinsac, A., Honeytraps, M.Y.: A network forensic tool. In: Proceedings of the Sixth Multi-Conference on Systemics, Florida, USA (2002)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: Survey and research challenges. Digital Investigation (2010) (in Press, Corrected Proof)","DOI":"10.1016\/j.diin.2010.02.003"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Almulhem, A.: Network forensics: Notions and challenges. In: IEEE International Symposium on Signal Processing and Information Technology, ISSPIT (2009)","DOI":"10.1109\/ISSPIT.2009.5407485"},{"issue":"1","key":"35_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2004.01.003","volume":"23","author":"M.K. Rogers","year":"2004","unstructured":"Rogers, M.K., Seigfried, K.: The future of computer forensics: a needs analysis survey. Computers & Security\u00a023(1), 12\u201316 (2004)","journal-title":"Computers & Security"},{"issue":"23-24","key":"35_CR5","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/S1389-1286(99)00114-0","volume":"31","author":"M.-Y. Huang","year":"1999","unstructured":"Huang, M.-Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks\u00a031(23-24), 2465\u20132475 (1999)","journal-title":"Computer Networks"},{"issue":"4","key":"35_CR6","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.diin.2005.11.007","volume":"2","author":"E. Casey","year":"2005","unstructured":"Casey, E.: Case study: Network intrusion investigation - lessons in forensic preparation. Digital Investigation\u00a02(4), 254\u2013260 (2005)","journal-title":"Digital Investigation"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Peng, W., Yao, S., Chen, J.: Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis. In: International Conference on Multimedia Information Networking and Security, MINES (2009)","DOI":"10.1109\/MINES.2009.108"},{"issue":"10","key":"35_CR8","first-page":"163","volume":"8","author":"R.Y. Siti Rahayu Selamat","year":"2008","unstructured":"Siti Rahayu Selamat, R.Y., Sahib, S.: Mapping Process of Digital Forensic Investigation Framework. IJCSNS International Journal of Computer Science and Network Security\u00a08(10), 163\u2013169 (2008)","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"35_CR9","unstructured":"Qin, X., Lee, W.: Attack plan recognition and prediction using causal networks. In: 20th Annual Computer Security Applications Conference (2004)"},{"key":"35_CR10","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence, 1st edn. Princeton University Press, Princeton (1976)","edition":"1"},{"key":"35_CR11","unstructured":"Burrus, N., Lesage, D.: Theory of Evidence (DRAFT), Technical Report. Le Kremlin-Bic\u00eatre CEDEX, France (2003)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Z., Peng, W.: An Intrusive Intention Recognition Model Based on Network Security States Graph. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2009 (2009)","DOI":"10.1109\/WICOM.2009.5302778"},{"key":"35_CR13","unstructured":"Peng, W., et al.: Recognizing Intrusive Intention Based on Dynamic Bayesian Networks. In: International Symposium on Information Engineering and Electronic Commerce, IEEC 2009(2009)"},{"issue":"10","key":"35_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4304\/jcp.3.10.36-43","volume":"3","author":"D. Zeng","year":"2008","unstructured":"Zeng, D., Xu, J., Xu, G.: Data Fusion for Traffic Incident Detector Using D-S Evidence Theory with Probabilistic SVMs. Journal of Computers\u00a03(10), 36\u201343 (2008)","journal-title":"Journal of Computers"},{"issue":"6","key":"35_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1132469.1132474","volume":"49","author":"A. Bonnie Brinton","year":"2006","unstructured":"Bonnie Brinton, A., et al.: The application of model checking for securing e-commerce transactions. Commun. ACM\u00a049(6), 97\u2013101 (2006)","journal-title":"Commun. ACM"},{"issue":"4","key":"35_CR16","doi-asserted-by":"publisher","first-page":"558","DOI":"10.15837\/ijccc.2010.4.2514","volume":"5","author":"D.E. Popescu","year":"2010","unstructured":"Popescu, D.E., Lonea, M., Zmaranda, D., Vancea, C., Tiurbe, C.: Some Aspects about Vagueness & Imprecision in Computer Network Fault-Tree Analysis. International Journal of Computers Communications & Control\u00a05(4), 558\u2013566 (2010); ISSN 1841-9836","journal-title":"International Journal of Computers Communications & Control"},{"issue":"1","key":"35_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.15837\/ijccc.2009.1.2414","volume":"4","author":"B. Reiz","year":"2009","unstructured":"Reiz, B., Csat\u00f3, L.: Bayesian Network Classifier for Medical Data Analysis. International Journal of Computers Communications & Control\u00a04(1), 65\u201372 (2009); ISSN 1841-9836","journal-title":"International Journal of Computers Communications & Control"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:06:56Z","timestamp":1637971616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}