{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:45Z","timestamp":1725771285586},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_22","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"239-250","source":"Crossref","is-referenced-by-count":8,"title":["A Graph Data Model for Attack Graph Generation and Analysis"],"prefix":"10.1007","author":[{"given":"Mridul Sankar","family":"Barik","sequence":"first","affiliation":[]},{"given":"Chandan","family":"Mazumdar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","first-page":"28","volume-title":"Proceedings of the 22nd International Conference on Data Engineering Workshops","author":"B. Chen","year":"2006","unstructured":"Chen, B., Yegneswaran, V., Barford, P., Ramakrishnan, R.: Toward a Query Language for Network Attack Data. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, pp. 28\u201328. IEEE Press, New York (2006)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-00199-4_13","volume-title":"Engineering Secure Software and Systems","author":"F. Chen","year":"2009","unstructured":"Chen, F., Su, J., Zhang, Y.: A Scalable Approach to Full Attack Graphs Generation. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol.\u00a05429, pp. 150\u2013163. Springer, Heidelberg (2009)"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TDSC.2010.61","volume":"9","author":"N. Idika","year":"2012","unstructured":"Idika, N., Bhargava, B.: Extending Attack Graph-Based Security Metrics and Aggregating Their Application. IEEE Transaction on Dependable and Secure Computing\u00a09(1), 75\u201385 (2012)","journal-title":"IEEE Transaction on Dependable and Secure Computing"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological Analysis of Network Attack Vul-nerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats. LNCS, pp. 247\u2013266. Springer (2005)","DOI":"10.1007\/0-387-24230-9_9"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Joslyn, C., Choudhury, S., Haglin, D., Howe, B., Nickless, B., Olsen, B.: Massive scale cyber traffic analysis: a driver for graph database research. In: First International Workshop on Graph Data Management Experiences and Systems, pp. 3:1\u20133:6. ACM, New York (2013)","DOI":"10.1145\/2484425.2484428"},{"key":"22_CR6","first-page":"981","volume-title":"Proceedings of the IEEE Conference on Military Communications","author":"R. Lippmann","year":"2006","unstructured":"Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., Cunningham, R.: Validating and restoring defense in depth using attack graphs. In: Proceedings of the IEEE Conference on Military Communications, pp. 981\u2013990. IEEE Press, Piscataway (2006)"},{"key":"22_CR7","unstructured":"Neo4j Graph Database, \n                    \n                      http:\/\/www.neo4j.org\/"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1145\/1180405.1180446","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","author":"X. Ou","year":"2006","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336\u2013345. ACM, New York (2006)"},{"key":"22_CR9","first-page":"156","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"R.W. Ritchey","year":"2000","unstructured":"Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 156\u2013165. IEEE Press, New York (2000)"},{"key":"22_CR10","first-page":"273","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"O. Sheyner","year":"2002","unstructured":"Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated Generation and Analysis of Attack Graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 273\u2013284. IEEE Press, New York (2002)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Vicknair, C., Macias, M., Zhao, Z., Nan, X., Chen, Y., Wilkins, D.: A comparison of a graph database and a relational database: a data provenance perspective. In: Proceedings of the 48th Annual Southeast Regional Conference, pp. 42:1\u201342:6. ACM, New York (2010)","DOI":"10.1145\/1900008.1900067"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11555827_15","volume-title":"Computer Security \u2013 ESORICS 2005","author":"L. Wang","year":"2005","unstructured":"Wang, L., Liu, A., Jajodia, S.: An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 247\u2013266. Springer, Heidelberg (2005)"},{"issue":"18","key":"22_CR13","doi-asserted-by":"publisher","first-page":"3812","DOI":"10.1016\/j.comcom.2006.06.018","volume":"29","author":"L. Wang","year":"2006","unstructured":"Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications\u00a029(18), 3812\u20133824 (2006)","journal-title":"Computer Communications"},{"issue":"4","key":"22_CR14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.3233\/JCS-2008-0327","volume":"16","author":"L. Wang","year":"2008","unstructured":"Wang, L., Yao, C., Singhal, A., Jajodia, S.: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security\u00a016(4), 419\u2013437 (2008)","journal-title":"Journal of Computer Security"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:20:41Z","timestamp":1558851641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}