{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T04:10:44Z","timestamp":1725941444005},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811078491"},{"type":"electronic","value":"9789811078507"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7850-7_10","type":"book-chapter","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T11:12:16Z","timestamp":1516014736000},"page":"107-117","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oleg","family":"Lauta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mikhail","family":"Kocinyak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,1,16]]},"reference":[{"issue":"2","key":"10_CR1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.9790\/0661-16293542","volume":"12","author":"A Luvanda","year":"2014","unstructured":"Luvanda, A., Kimani, S., Kimwele, M.: Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications. IOSR J. Comput. Eng. (IOSR-JCI) 12(2), 35\u201342 (2014)","journal-title":"IOSR J. Comput. Eng. (IOSR-JCI)"},{"key":"10_CR2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1017\/CBO9781139565363","volume-title":"Stochastic Networks","author":"F Kelly","year":"2014","unstructured":"Kelly, F., Yudovina, E.: Stochastic Networks, p. 230. Cambridge University Press, Cambridge (2014)"},{"issue":"4","key":"10_CR3","first-page":"1","volume":"4","author":"I Saenko","year":"2016","unstructured":"Saenko, I., Lauta, O., Kotenko, I.: Analytical modeling of mobile banking attacks based on a stochastic network conversion technique. IT Converg. Pract. 4(4), 1\u201310 (2016)","journal-title":"IT Converg. Pract."},{"key":"10_CR4","unstructured":"OPNET Technologies. http:\/\/www.opnet.com\/"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Ahuja, S.P.: COMNET III: a network simulation laboratory environment for a course in communications networks. In: Proceedings of the 28th Annual Frontiers in Education Conference (FIE 1998), vol. 3, pp. 1085\u20131088 (1998)","DOI":"10.1109\/FIE.1998.738567"},{"key":"10_CR6","unstructured":"Kotenko, I., Chechulin, A.: A cyber attack modeling and impact assessment framework. In: Proceedings of the 5th IEEE International Conference on Cyber Conflict (CyCon), pp. 1\u201324 (2013)"},{"issue":"3","key":"10_CR7","first-page":"14","volume":"5","author":"I Kotenko","year":"2014","unstructured":"Kotenko, I., Doynikova, E.: Evaluation of computer network security based on attack graphs and security event processing. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(3), 14\u201329 (2014)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Dudorov, D., Stupples, D., Newby, M.: Probability analysis of cyber attack paths against business and commercial enterprise systems. In: Proceedings of the 2013 European Intelligence and Security Informatics Conference, pp. 38\u201344 (2013)","DOI":"10.1109\/EISIC.2013.13"},{"issue":"1","key":"10_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijcnc.2015.7101","volume":"7","author":"S Abraham","year":"2015","unstructured":"Abraham, S., Nair, S.: A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. (IJCNC) 7(1), 1\u201317 (2015)","journal-title":"Int. J. Comput. Netw. Commun. (IJCNC)"},{"key":"10_CR10","unstructured":"Matlof, N.: From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science. http:\/\/heather.cs.ucdavis.edu\/probstatbook"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36084-0_11","volume-title":"Recent Advances in Intrusion Detection","author":"RP Goldman","year":"2002","unstructured":"Goldman, R.P.: A stochastic model for intrusions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 199\u2013218. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36084-0_11"},{"key":"10_CR12","first-page":"2015","volume":"27","author":"M Z\u00f6hrer","year":"2014","unstructured":"Z\u00f6hrer, M., Pernkopf, F.: General stochastic networks for classification. Adv. Neural. Inf. Process. Syst. 27, 2015\u20132023 (2014)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR13","unstructured":"Bengio, Y., Thibodeau-Laufer, E., Alain, G., Yosinski, J.: Deep Generative Stochastic Networks Trainable by Backprop (2014). http:\/\/arxiv.org\/abs\/1306.1091"},{"key":"10_CR14","series-title":"Applications of Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1482-3","volume-title":"Introduction to Stochastic Networks","author":"RF Serfozo","year":"1999","unstructured":"Serfozo, R.F.: Introduction to Stochastic Networks. Applications of Mathematics, vol. 44. Springer, New York (1999). https:\/\/doi.org\/10.1007\/978-1-4612-1482-3"},{"key":"10_CR15","volume-title":"Laplace Transforms, Problem Solvers","author":"J Williams","year":"1973","unstructured":"Williams, J.: Laplace Transforms, Problem Solvers. George Allen & Unwin, London (1973)"},{"key":"10_CR16","volume-title":"Fundamentals of Network Analysis","author":"DT Phillips","year":"1981","unstructured":"Phillips, D.T., Garsia-Diaz, A.: Fundamentals of Network Analysis. Prentice-Hall, Englewood Cliffs (1981)"},{"issue":"1","key":"10_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF00412328","volume":"37","author":"SS Petrova","year":"1987","unstructured":"Petrova, S.S.: Heaviside and the development of the symbolic calculus. Arch. Hist. Exact Sci. 37(1), 1\u201323 (1987)","journal-title":"Arch. Hist. Exact Sci."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7850-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,25]],"date-time":"2020-10-25T16:44:04Z","timestamp":1603644244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7850-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811078491","9789811078507"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7850-7_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}