{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:51:51Z","timestamp":1725749511804},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_26","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"277-288","source":"Crossref","is-referenced-by-count":12,"title":["Telecommunications Networks Risk Assessment with Bayesian Networks"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Szpyrka","sequence":"first","affiliation":[]},{"given":"Bartosz","family":"Jasiul","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Wrona","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Dziedzic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"CCTA Risk Analysis and Management Method, http:\/\/www.cramm.com\/"},{"key":"26_CR2","unstructured":"Common Vulnerabilities and Exposures, http:\/\/cve.mitre.org\/"},{"key":"26_CR3","unstructured":"EAR\/Pilar - Risk Analysis Environment, https:\/\/www.ccn-cert.cni.es\/"},{"key":"26_CR4","unstructured":"MEHARI - Method for Harmonized Analysis of Risk, http:\/\/www.clusif.asso.fr\/"},{"key":"26_CR5","unstructured":"MulVAL Attack Paths Engine, http:\/\/forge.fi-ware.eu\/plugins\/mediawiki\/wiki\/fiware\/index.php\/MulVAL_Attack_Paths_Engine_-_User_and_Programmer_Guide"},{"key":"26_CR6","unstructured":"National Vulnerability Database, http:\/\/nvd.nist.gov\/"},{"key":"26_CR7","unstructured":"Play Framework, http:\/\/www.playframework.org\/"},{"key":"26_CR8","unstructured":"SMILE Documentation, http:\/\/genie.sis.pitt.edu\/wiki\/SMILE_Documentation"},{"key":"26_CR9","unstructured":"Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information: Expression des Besoins et Identification des Objectifs de S\u00e9curit\u00e9 (EBIOS) (2010)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, version 1.0 (1999)","DOI":"10.21236\/ADA367718"},{"key":"26_CR11","unstructured":"Apiecionek, \u0141., Romantowski, M., \u015aliwa, J., Jasiul, B., Goniacz, R.: Safe exchange of information for civil-military operations. In: Military Communications and Information Technology: A Comprehensive Approach Enabler, pp. 39\u201350. WAT Publishing (2010)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Barber, D.: Bayesian Reasoning and Machine Learning. Cambrdge University Press (2013)","DOI":"10.1017\/CBO9780511804779"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-16342-5_25","volume-title":"Information Security and Cryptology","author":"E. Bursztein","year":"2010","unstructured":"Bursztein, E., Mitchell, J.C.: Using strategy objectives for network security analysis. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol.\u00a06151, pp. 337\u2013349. Springer, Heidelberg (2010)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Darwiche, A.: Modeling and reasoning with Bayesian networks. Cambridge Univ. (2009)","DOI":"10.1017\/CBO9780511811357"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Domingo, A., Wietgrefe, H.: A NNEC-compliant approach for a Future Mission Network. In: Proc. of the Military Communications Conference, MILCOM (2012)","DOI":"10.1109\/MILCOM.2012.6415626"},{"key":"26_CR16","volume-title":"Guide to Attribute Based Access Control Definition and Considerations, Draft","author":"V.C. Hu","year":"2013","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control Definition and Considerations, Draft. NIST Special Publication 800-162, Gaithersburg (2013)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Proc. of ACSAC Conf. 2006, pp. 121\u2013130. IEEE Computer Society (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"26_CR18","unstructured":"ISO\/IEC: ISO\/IEC 27001:2005 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements (2008)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kjaerulff, U., Madsen, A.: Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis. Springer (2008)","DOI":"10.1007\/978-0-387-74101-7"},{"key":"26_CR20","unstructured":"Lagadec, P., Dandurand, L., Bouillon, E., Wrona, K., Torrente, S.: Cyber Defence Situational Awareness and Dynamic Risk Assessment. In: NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, Tallin, Estonia (2010)"},{"key":"26_CR21","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"S. Lauritzen","year":"1988","unstructured":"Lauritzen, S., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their application to expert systems. Journal of the Royal Statistical Society series B\u00a050, 157\u2013224 (1988)","journal-title":"Journal of the Royal Statistical Society series B"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Matousek, P., R\u00e1b, J., Rysavy, O., Sv\u00e9da, M.: A Formal Model for Network-Wide Security Analysis. In: Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 171\u2013181. IEEE Comp. Soc. (2008)","DOI":"10.1109\/ECBS.2008.13"},{"key":"26_CR23","unstructured":"McGraw, R.: Risk-adaptable access control (radac). In: NIST Privilege (Access) Management Workshop (2009)"},{"key":"26_CR24","unstructured":"Ministerio de Administraciones P\u00fablicas: MAGERIT version 2, Methodology for Information Systems Risk Analysis and Management, Book I The Method (2006)"},{"key":"26_CR25","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-44831-4_14","volume-title":"Advances in Web Intelligence","author":"G.J. Nalepa","year":"2003","unstructured":"Nalepa, G.J., Lig\u0119za, A.: Designing reliable Web security systems using rule-based systems approach. In: Menasalvas, E., Segovia, J., Szczepaniak, P.S. (eds.) AWIC 2003. LNCS (LNAI), vol.\u00a02663, pp. 124\u2013133. Springer, Heidelberg (2003)"},{"issue":"6","key":"26_CR26","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1142\/S0218213011000541","volume":"20","author":"G.J. Nalepa","year":"2011","unstructured":"Nalepa, G.J., Lig\u0119za, A., Kaczor, K.: Formalization and modeling of rules using the XTT2 method. International Journal on Artificial Intelligence Tools\u00a020(6), 1107\u20131125 (2011)","journal-title":"International Journal on Artificial Intelligence Tools"},{"key":"26_CR27","unstructured":"OASIS: eXtensible Access Control Markup Language ver. 3.0. Tech. Rep. (August 2010)"},{"key":"26_CR28","unstructured":"Ou, X., Govindavajhala, S., Appel, A.: MulVAL: A logic-based network security analyzer. In: Proc. of 14th USENIX Security Symposium, Baltimore, Maryland, USA (2005)"},{"key":"26_CR29","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobbs\u2019 Journal (1999)"},{"key":"26_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/978-3-642-23935-9_59","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"J. Sliwa","year":"2011","unstructured":"Sliwa, J., Gleba, K., Chmiel, W., Szwed, P., Glowacz, A.: IOEM - Ontology Engineering Methodology for Large Systems. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 602\u2013611. Springer, Heidelberg (2011)"},{"issue":"1","key":"26_CR31","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11241-006-9003-0","volume":"35","author":"M. Szpyrka","year":"2007","unstructured":"Szpyrka, M.: Analysis of VME-Bus communication protocol \u2013 RTCP-net approach. Real-Time Systems\u00a035(1), 91\u2013108 (2007)","journal-title":"Real-Time Systems"},{"key":"26_CR32","series-title":"SCI","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-540-77475-4_16","volume-title":"Knowledge-Driven Computing","author":"M. Szpyrka","year":"2008","unstructured":"Szpyrka, M.: Design and analysis of rule-based systems with Adder Designer. In: Cotta, C., Reich, S., Schaefer, R., Lig\u00e9za, A. (eds.) Knowledge-Driven Computing. SCI, vol.\u00a0102, pp. 255\u2013271. Springer, Heidelberg (2008)"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Szpyrka, M.: Exclusion rule-based systems \u2013 case study. In: International Multiconference on Computer Science and Information Technology, Wis\u0142a, Poland, vol.\u00a03, pp. 237\u2013242 (2008)","DOI":"10.1109\/IMCSIT.2008.4747245"},{"key":"26_CR34","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-540-73451-2_68","volume-title":"Rough Sets and Intelligent Systems Paradigms","author":"M. Szpyrka","year":"2007","unstructured":"Szpyrka, M., Szmuc, T.: Decision tables in Petri net models. In: Kryszkiewicz, M., Peters, J.F., Rybi\u0144ski, H., Skowron, A. (eds.) RSEISP 2007. LNCS (LNAI), vol.\u00a04585, pp. 648\u2013657. Springer, Heidelberg (2007)"},{"issue":"2-3","key":"26_CR35","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s11235-009-9242-1","volume":"45","author":"K. Wrona","year":"2010","unstructured":"Wrona, K., Hallingstad, G.: Real-time automated risk assessment in protected core networking. Telecommunication Systems\u00a045(2-3), 205\u2013214 (2010)","journal-title":"Telecommunication Systems"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Wrona, K., Hallingstad, G.: Controlled information sharing in NATO operations. In: IEEE Military Communications Conference (MILCOM), pp. 1285\u20131290. IEEE (2011)","DOI":"10.1109\/MILCOM.2011.6127479"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,18]],"date-time":"2024-05-18T00:03:35Z","timestamp":1715990615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}