{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:12Z","timestamp":1725808332968},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_2","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T16:38:21Z","timestamp":1412872701000},"page":"17-29","source":"Crossref","is-referenced-by-count":1,"title":["Using Fraud Trees to Analyze Internet Credit Card Fraud"],"prefix":"10.1007","author":[{"given":"Clive","family":"Blackwell","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/168588.168615","volume-title":"Proceedings of the First ACM Conference on Computer and Communications Security","author":"R. Anderson","year":"1993","unstructured":"R. Anderson, Why cryptosystems fail, Proceedings of the First ACM Conference on Computer and Communications Security, pp. 215\u2013227, 1993."},{"key":"2_CR2","volume-title":"Proceedings of the Second International Conference on Cyber Crime, Security and Digital Forensics","author":"B. Aziz","year":"2012","unstructured":"B. Aziz, Towards goal-driven digital forensic investigations, Proceedings of the Second International Conference on Cyber Crime, Security and Digital Forensics, 2012."},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdcf.2013040101","volume":"5","author":"B. Aziz","year":"2013","unstructured":"B. Aziz, C. Blackwell and S. Islam, A framework for digital forensics and investigations: The goal-driven approach, International Journal of Digital Crime and Forensics, vol. 5(2), pp. 1\u201322, 2013.","journal-title":"International Journal of Digital Crime and Forensics"},{"key":"2_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-41148-9_11","volume-title":"Advances in Digital Forensics IX","author":"C. Blackwell","year":"2013","unstructured":"C. Blackwell, B. Aziz and S. Islam, Using a goal-driven approach in the investigation of a questioned contract, in Advances in Digital Forensics IX, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 153\u2013167, 2013."},{"key":"2_CR5","volume-title":"Chip and skim: Cloning EMV cards with the pre-play attack","author":"M. Bond","year":"2012","unstructured":"M. Bond, O. Choudary, S. Murdoch, S. Skorobogatov and R. Anderson, Chip and skim: Cloning EMV cards with the pre-play attack ( http:\/\/arxiv.org\/pdf\/1209.2531.pdf ), 2012."},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00766-013-0168-5","volume":"18","author":"A. Cailliau","year":"2013","unstructured":"A. Cailliau and A. van Lamsweerde, Assessing requirements-related risks through probabilistic goals and obstacles, Requirements Engineering, vol. 18(2), pp. 129\u2013146, 2013.","journal-title":"Requirements Engineering"},{"key":"2_CR7","first-page":"144","volume-title":"Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences","author":"K. Edge","year":"2007","unstructured":"K. Edge, R. Raines, M. Grimaila, R. Baldwin, R. Bennington and C. Reuter, The use of attack and protection trees to analyze security for an online banking system, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, p. 144b, 2007."},{"key":"2_CR8","unstructured":"EMVCo, EMV 4.3, Otley, United Kingdom ( www.emvco.com\/specifications.aspx?id=223 ), 2011."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"B. Kordy, S. Mauw, S. Radomirovic and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, 2012.","DOI":"10.1093\/logcom\/exs029"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-14577-3_27","volume-title":"Financial Cryptography and Data Security","author":"S. Murdoch","year":"2010","unstructured":"S. Murdoch and R. Anderson, Verified by Visa and MasterCard SecureCode: Or, how not to design authentication, in Financial Cryptography and Data Security, Springer-Verlag, R. Sion (Ed.), Berlin Heidelberg, Germany, pp. 336\u2013342, 2010."},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/225434.225462","volume-title":"Proceedings of the First Conference on Designing Interactive Systems: Processes, Practices, Methods and Techniques","author":"C. Potts","year":"1995","unstructured":"C. Potts, Using schematic scenarios to understand user needs, Proceedings of the First Conference on Designing Interactive Systems: Processes, Practices, Methods and Techniques, pp. 247\u2013256, 1995."},{"key":"2_CR12","volume-title":"Implementing Electronic Card Payment Systems","author":"C. Radu","year":"2002","unstructured":"C. Radu, Implementing Electronic Card Payment Systems, Artech House, Norwood, Massachusetts, 2002."},{"issue":"12","key":"2_CR13","first-page":"21","volume":"24","author":"B. Schneier","year":"1999","unstructured":"B. Schneier, Attack trees, Dr. Dobb\u2019s Journal, vol. 24(12), pp. 21\u201329, 1999.","journal-title":"Dr. Dobb\u2019s Journal"},{"key":"2_CR14","unstructured":"The U.K. Cards Association, Card-not-present transactions, London, United Kingdon ( www.theukcardsassociation.org.uk\/cards-transactions\/card-not-present.asp )."},{"key":"2_CR15","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/ICSE.2004.1317437","volume-title":"Proceedings of the Twenty-Sixth International Conference on Software Engineering","author":"A. Lamsweerde van","year":"2004","unstructured":"A. van Lamsweerde, Elaborating security requirements by construction of intentional anti-models, Proceedings of the Twenty-Sixth International Conference on Software Engineering, pp. 148\u2013157, 2004."},{"key":"2_CR16","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"A. Lamsweerde van","year":"2009","unstructured":"A. van Lamsweerde, Requirements Engineering: From System Goals to UML Models to Software Specifications, Wiley, Chichester, United Kingdom, 2009."},{"key":"2_CR17","first-page":"49","volume-title":"Proceedings of the Workshop on Requirements for High Assurance Systems","author":"A. Lamsweerde van","year":"2003","unstructured":"A. van Lamsweerde, S. Brohez, R. De Landtsheer and D. Janssens, From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering, Proceedings of the Workshop on Requirements for High Assurance Systems, pp. 49\u201356, 2003."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T05:03:58Z","timestamp":1689570238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}