{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:52:21Z","timestamp":1765619541012},"publisher-location":"New Delhi","reference-count":12,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_42","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"507-516","source":"Crossref","is-referenced-by-count":1,"title":["Generation and Risk Analysis of Network Attack Graph"],"prefix":"10.1007","author":[{"given":"Keshav","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Santosh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Anuradha","family":"Negi","sequence":"additional","affiliation":[]},{"given":"Aniket","family":"Mahanti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W., McQueen, M.: A Scalable Approach to Attack Graph Generation. ACM (2006)","DOI":"10.1145\/1180405.1180446"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarsi, K.: Practical attack graph generation for network defense. In: 22nd Annual Conference on Computer Security Application, pp. 121\u2013130 (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"42_CR3","first-page":"217","volume-title":"Lecture Notes in Computer Science","author":"Su Zhang","year":"2011","unstructured":"Zhang, S., Caragea, D., Ou, X.: An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities. Database and Expert Systems Applications, pp. 217\u2013231. Springer, Berlin (2011)"},{"key":"42_CR4","unstructured":"Ou, X., Appel, A.W.: A logic-programming approach to network security analysis. USENIX Security (2005)"},{"key":"42_CR5","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: 14th Usenix Security Symposium (2005)"},{"key":"42_CR6","unstructured":"Nessus security scanner. \n                    http:\/\/www.nessus.org"},{"key":"42_CR12","unstructured":"NIST, NVD. \n                    http:\/\/nvd.nist.gov\/cvss.cfm"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Metrics suite for network attack graph analytics. In: Proceedings of the 9th Cyber and Information Security Research Conference. Oak Ridge National Laboratory, Tennessee (2014)","DOI":"10.1145\/2602087.2602117"},{"key":"42_CR8","first-page":"283","volume-title":"Lecture Notes in Computer Science","author":"Lingyu Wang","year":"2008","unstructured":"Wang, L., Islam, T., Long, T., Singhal, A.: An Attack Graph-Based Probabilistic Security Metric. Data and Applications Security, pp. 283\u2013296. Springer, Berlin (2008)"},{"key":"42_CR9","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-540-73538-0_9","volume-title":"Data and Applications Security XXI","author":"Lingyu Wang","year":"2007","unstructured":"Wang, L., Singhal, A., Jajodia, S.: Measuring the overall security of network configurations using attack graphs. Lecture Notes in Computer Science, vol. 4602, pp. 98\u2013112. Springer, New York (2007)"},{"key":"42_CR10","unstructured":"Williams, L., Lippmann, R., Ingols, K.: GARNET\u2014a graphical attack graph and reachability network evaluation tool. In: Proceedings of the 5th International Workshop. Springer, Cambridge (2008)"},{"key":"42_CR11","unstructured":"Common Vulnerability Scoring System (CVSS). \n                    http:\/\/www.first.org\/cvss"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T08:55:37Z","timestamp":1559292937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}