{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:35:43Z","timestamp":1770219343847,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642371189","type":"print"},{"value":"9783642371196","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_23","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"357-364","source":"Crossref","is-referenced-by-count":11,"title":["Towards Modelling Adaptive Attacker\u2019s Behaviour"],"prefix":"10.1007","author":[{"given":"Leanid","family":"Krautsevich","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Artsiom","family":"Yautsiukhin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"198","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE TIT\u00a029, 198\u2013208 (1983)","journal-title":"IEEE TIT"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Gallon, L., Bascou, J.-J.: Cvss attack graphs. In: SITIS (2011)","DOI":"10.1109\/SITIS.2011.24"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-21040-2_22","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"L. Krautsevich","year":"2011","unstructured":"Krautsevich, L., Martinelli, F., Yautsiukhin, A.: Formal Analysis of Security Metrics and Risk. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 304\u2013319. Springer, Heidelberg (2011)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: QEST (2011)","DOI":"10.1109\/QEST.2011.34"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/3-540-49059-0_11","volume-title":"Tools and Algorithms for the Construction of Analysis of Systems","author":"D. Marchignoli","year":"1999","unstructured":"Marchignoli, D., Martinelli, F.: Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques. In: Cleaveland, W.R. (ed.) TACAS\/ETAPS 1999. LNCS, vol.\u00a01579, pp. 148\u2013162. Springer, Heidelberg (1999)"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.tcs.2005.10.044","volume":"353","author":"J.C. Mitchell","year":"2006","unstructured":"Mitchell, J.C., Ramanathan, A., Scedrovb, A., Teaguea, V.: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. TCS\u00a0353, 118\u2013164 (2006)","journal-title":"TCS"},{"key":"23_CR7","unstructured":"Mitnik, K.D., Simon, W.L.: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Wiley (2005)"},{"key":"23_CR8","unstructured":"Pettersen, Y.N.: Renego patched servers: A long-term interoperability time bomb brewing (July 20, 2012), http:\/\/my.opera.com\/yngve\/blog\/2010\/06\/02\/renego-patched-servers-a-long-term-interoperability-time-bomb-brewing"},{"key":"23_CR9","unstructured":"Puterman, M.L.: Markov Decision Processes Discrete Stochastic Dynamic Programming. Wiley-Interscience (2005)"},{"key":"23_CR10","unstructured":"Sarraute, C., Buffet, O., Hoffmann, J.: Pomdps make better hackers: Accounting for uncertainty in penetration testing. In: AAAI (2012)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: IEEE SSP, pp. 273\u2013284 (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"23_CR12","first-page":"2917","volume":"29","author":"L. Wang","year":"2006","unstructured":"Wang, L., Liu, A., Jajodia, S.: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. CC\u00a029, 2917\u20132933 (2006)","journal-title":"CC"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:10Z","timestamp":1745979190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}