{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:22:35Z","timestamp":1762017755472},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_47","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"462-471","source":"Crossref","is-referenced-by-count":29,"title":["Security Assessment of Computer Networks Based on Attack Graphs and Security Events"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Elena","family":"Doynikova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, M.S., Al-Shaer, E., Khan, L.: A Novel Quantitative Approach for Measuring Network Security. In: INFOCOM 2008, pp. 1957\u20131965 (2008)","DOI":"10.1109\/INFOCOM.2008.260"},{"key":"47_CR2","first-page":"1","volume":"6","author":"C.W. Axelrod","year":"2008","unstructured":"Axelrod, C.W.: Accounting for Value and Uncertainty in Security Metrics. Information Systems Control Journal\u00a06, 1\u20136 (2008)","journal-title":"Information Systems Control Journal"},{"key":"47_CR3","unstructured":"Blakely, B.A.: Cyberprints Identifying Cyber Attackers by Feature Analysis. Doctoral Dissertation: Iowa State University (2012)"},{"key":"47_CR4","unstructured":"The Center for Internet Security, The CIS Security Metrics (2009)"},{"issue":"1","key":"47_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/sec.58","volume":"2","author":"R. Dantu","year":"2009","unstructured":"Dantu, R., Kolan, P., Cangussu, J.: Network Risk Management Using Attacker Profiling. Security and Communication Networks\u00a02(1), 83\u201396 (2009)","journal-title":"Security and Communication Networks"},{"key":"47_CR6","unstructured":"Idika, N.C.: Characterizing and Aggregating Attack Graph-Based Security Metric. PhD Thesis, Purdue University, pp. 1\u2013131 (2010)"},{"key":"47_CR7","unstructured":"ISO\/IEC 27005: 2008, Information technology\u00a0\u2014 Security techniques\u00a0\u2014 Information security risk management (2008)"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Jahnke, M., Thul, C., Martini, P.: Graph-based Metrics for Intrusion Response Measures in Computer Networks. In: IEEE Workshop on Network Security (2007)","DOI":"10.1109\/LCN.2007.45"},{"key":"47_CR9","unstructured":"Henning, R., et al.: Workshop on Information Security System, Scoring and Ranking (\u201cSecurity Metrics\u201d), MITRE, Williamsburg, Virginia (2002)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Araujo, J.: Automated Reaction Based on Risk Analysis and Attackers Skills in Intrusion Detection Systems. In: CRiSIS 2008, Toezer, Tunisia, pp. 117\u2013124 (2008)","DOI":"10.1109\/CRISIS.2008.4757471"},{"key":"47_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-15497-3_38","volume-title":"Computer Security \u2013 ESORICS 2010","author":"N. Kheir","year":"2010","unstructured":"Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A Service Dependency Model for Cost-Sensitive Intrusion Response. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 626\u2013642. Springer, Heidelberg (2010)"},{"key":"47_CR12","unstructured":"Kotenko, I., Chechulin, A.: A Cyber Attack Modeling and Impact Assessment Framework. In: CyCon 2013, pp. 119\u2013142. IEEE and NATO COE Publications (2013)"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Saenko, I., Polubelova, O., Doynikova, E.: The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. In: RaSIEM 2013 (2013)","DOI":"10.1109\/ARES.2013.84"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Wing, J.M.: An Attack Surface Metric. IEEE Transactions on Software Engineering, 371\u2013386 (2010)","DOI":"10.1109\/TSE.2010.60"},{"key":"47_CR15","unstructured":"Mayer, A.: Operational Security Risk Metrics: Definitions, Calculations, Visualizations. Metricon 2.0. CTO RedSeal Systems (2007)"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System Version 2.0 (2007)","DOI":"10.1049\/iet-ifs:20060055"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack Modeling for Information Security and Survivability. Technical Note CMU\/SEI-2001-TN-001. Survivable Systems (2001)","DOI":"10.21236\/ADA387544"},{"key":"47_CR18","unstructured":"NMap reference guide, http:\/\/nmap.org\/book\/man.html"},{"issue":"1","key":"47_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N. Poolsappasit","year":"2012","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Transactions on Dependable and Security Computing\u00a09(1), 61\u201374 (2012)","journal-title":"IEEE Transactions on Dependable and Security Computing"},{"key":"47_CR20","unstructured":"Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, I., Hatfield, A.: Current Trends and Advances in Information Assurance Metrics. In: Proc. of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, NB (October 2004)"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L.: Security Metrics Guide for Information Technology Systems. NIST Special Publication 800-55 (July 2003)","DOI":"10.6028\/NIST.SP.800-55"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Vaughn, R., Henning, R., Siraj, A.: Information Assurance Measures and Metrics: State of Practice and Proposed Taxonomy. In: Proc. of 36th Hawaii Int. Conf. on System Sciences, HICSS 2003 (2003)","DOI":"10.1109\/HICSS.2003.1174904"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T23:06:39Z","timestamp":1648681599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}