{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:35:54Z","timestamp":1743118554694,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811370243"},{"type":"electronic","value":"9789811370250"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-7025-0_11","type":"book-chapter","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T06:38:47Z","timestamp":1551163127000},"page":"109-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on ICS Intrusion Success Rate Algorithm Based on Attack and Defense Countermeasures"],"prefix":"10.1007","author":[{"given":"Wending","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kaixing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,27]]},"reference":[{"key":"11_CR1","unstructured":"Jiang, W., Fang, B.X., Tian, Z.H.: Network security measurement and optimal active defense based on offense and defense game model. J. Comput. 32(04), 817\u2013827 (2009)"},{"key":"11_CR2","unstructured":"Peng, Y., Jiang, C.Q., Xie, F.: Research progress of information security in industrial control system. J. Tsinghua Univ. (Nat. Sci.) 52(10), 1396\u20131408 (2012)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ru, Y., Wang, Y., Li, J.: Risk assessment of cyber attacks in ECPS based on attack tree and AHP. In: 2016 12th International Conference Natural Computation, Fuzzy Systems and Knowledge Discovery, pp. 465\u2013470. IEEE, USA (2016)","DOI":"10.1109\/FSKD.2016.7603218"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1109\/TSG.2016.2614603","volume":"9","author":"Ying Chen","year":"2018","unstructured":"Chen, Y., Hong, J., Liu, C.C.: Modeling of Intrusion and defense for assessment of cyber security at power substations. IEEE Trans. Smart Grid 9(4), 2541\u20132552 (2016)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2018.01.013","volume":"133","author":"A Arghavani","year":"2018","unstructured":"Arghavani, A., Arghavani, M., Ahmadi, M.: Attacker-manager game tree (AMGT): a new framework for visualizing and analysing the interactions between attacker and network security manager. Comput. Netw. 133, 42\u201358 (2018)","journal-title":"Comput. Netw."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pietre, L., Schweitzer, P.: DAG-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.09.009","volume":"56","author":"Yulia Cherdantseva","year":"2016","unstructured":"Cherdantseva, Y., Bumap, P., Blyth, A.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016)","journal-title":"Computers & Security"},{"issue":"05","key":"11_CR8","first-page":"792","volume":"42","author":"JH Huang","year":"2016","unstructured":"Huang, J.H., Feng, D.Q., Wang, H.J.: Quantification method of industrial control system vulnerability based on attack graph. Autom. J. 42(05), 792\u2013798 (2016)","journal-title":"Autom. J."},{"key":"11_CR9","unstructured":"GB\/T 33009.3-2016, Industrial automation and control systems network security distributed control system (DCS) part 3: evaluation guide"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.im.2003.11.002","volume":"42","author":"C Okil","year":"2004","unstructured":"Okil, C., Pawlowski, S.D.: The delphi method as a research tool: an example, design considerations and applications. Inf. Manage. 42(1), 15\u201329 (2004)","journal-title":"Inf. Manage."},{"key":"11_CR11","unstructured":"Liu, F.F.: Process industrial data analytics for alarm analysis. Beijing University of Chemical Technology, pp. 1\u201377 (2015)"}],"container-title":["Communications in Computer and Information Science","Geo-informatics in Sustainable Ecosystem and Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-7025-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T01:19:59Z","timestamp":1558574399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-7025-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811370243","9789811370250"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-7025-0_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}