{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:46Z","timestamp":1725687166250},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_35","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T12:20:29Z","timestamp":1338898829000},"page":"424-442","source":"Crossref","is-referenced-by-count":6,"title":["Optimizing Network Patching Policy Decisions"],"prefix":"10.1007","author":[{"given":"Yolanta","family":"Beres","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Griffin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Arbaugh, W.A., Fithem, W.L., McHugh, J.: Windows of Vulnerability: A Case Study Analysis. IEEE Computer (2000)"},{"key":"35_CR2","unstructured":"Beattie, S., Arnold, S., Cowan, C., Wagle, P., Wright, C., Shostack, A.: Timing the Application of Security Patches for Optimal Uptime. In: Proc of LISA 2002: 16th System Administration Conference (2002)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Beres, Y., Griffin, J., Heitman, M., Markle, D., Ventura, P.: Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Windows. In: Proc. of 2008 ACSAC (December 2008)","DOI":"10.1109\/ACSAC.2008.42"},{"key":"35_CR4","unstructured":"Cisco Security Advisories and Notices, The publication schedule for Cisco Internetwork Operating System (IOS) Security Advisories (March 2006)"},{"key":"35_CR5","unstructured":"Felix \u201cFX\u201d Lindner, \u201cCisco Vulnerabilities\u201d, BlackHat Federal (2003)"},{"key":"35_CR6","unstructured":"Felix \u201cFX\u201d Lindner, \u201cDevelopment in Cisco IOS Forensics\u201d, Defcon 11 (2003)"},{"key":"35_CR7","unstructured":"Technical interview, \u201cExploiting Cisco with FX\u201d (2005), \n                    \n                      http:\/\/www.securityfocus.com\/columnists\/351\/2"},{"key":"35_CR8","unstructured":"Felix \u201cFX\u201d Lindner, Cisco IOS-Attack and Defense: State of the Art. In: 25th Chaos Communication Congress (December 2008)"},{"key":"35_CR9","unstructured":"Lynn, M.: The Holy Grail: Cisco IOS shellcode and exploitation techniques, Black Hat USA (July 2005)"},{"key":"35_CR10","unstructured":"Pym, D., Monahan, B.: A Structural and Stochastic Modelling Philosophy for Systems Integrity. HP Labs Technical Report (2006)"},{"key":"35_CR11","unstructured":"Radianti, J.: Assessing Risks of Policies to Patch Software Vulnerabilities. In: Proc. Of International System Dynamics Conference (July 2006)"},{"key":"35_CR12","unstructured":"Schneier, B.: Managed Security Monitoring: Closing the Window of Exposure, Counterpane"},{"key":"35_CR13","unstructured":"Symantec Global Internet Security Threat Report: Trends for July\u2013December 2007, vol. XII (April 2008)"},{"key":"35_CR14","unstructured":"Zhang, G., Tan, Y., Dey, D.: Optimal Policies for Security Patch Management, under review"},{"key":"35_CR15","unstructured":"Secunia Advisories by Vendor, \n                    \n                      http:\/\/secunia.com\/advisories\/"},{"key":"35_CR16","unstructured":"InfoWorld News, Cisco warns of new hacking toolkit (March 2004)"},{"key":"35_CR17","unstructured":"NetworkWorld News, Can anyone stop the Cisco exploit? (November 2006)"},{"key":"35_CR18","unstructured":"Cavusoglu, H., Cavusoglu, H., Zhang, J.: Economics of Security Patch Management. In: Workshop on Economics of Information Security (WEIS) (June 2006)"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Cavusoglu, H., Cavusoglu, H., Zhang, J.: Security Patch Management\u2014Share the Burden or Share the Damage? Management Science\u00a054(1) (April 2008)","DOI":"10.1287\/mnsc.1070.0794"},{"key":"35_CR20","unstructured":"Patterson, D.: A simple model of the cost of downtime. In: Proceedings of Large Installation System Administration Conference (LISA 2002), USENIX Assoc. (2002)"},{"key":"35_CR21","unstructured":"Couch, A.L., Wu, N., Susanto, H.: Toward a Cost Model for System Administration. In: Proceedings of Large Installation System Administration Conference (LISA 2005). USENIX Assoc. (2005)"},{"key":"35_CR22","unstructured":"Verizon 2009 Data Breach Investigations Report (2009)"},{"key":"35_CR23","unstructured":"\u2019FX\u2019 Lindner, F.: Cisco IOS Router Exploitation. Blackhat (2009)"},{"key":"35_CR24","unstructured":"\u2019topo\u2019 Mu\u00f1iz, S.: Killing the myth of Cisco IOS rootkits (May 2008), \n                    \n                      http:\/\/www.coresecurity.com\/files\/attachments\/Killing_the_myth_of_Cisco_IOS_rootkits.pdf"},{"key":"35_CR25","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. HP and College Publications (2012)"},{"key":"35_CR26","unstructured":"The Cloud Stewardship Economics Project, IISP, \n                    \n                      https:\/\/www.instisp.org\/SSLPage.aspx?pid=463"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:39:36Z","timestamp":1620113976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_35","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}