{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:13:24Z","timestamp":1771024404872,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T00:00:00Z","timestamp":1510358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Indian Institute of Management Lucknow","award":["228"],"award-info":[{"award-number":["228"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10796-017-9809-4","type":"journal-article","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T04:09:41Z","timestamp":1510373381000},"page":"959-977","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs"],"prefix":"10.1007","volume":"21","author":[{"given":"Saini","family":"Das","sequence":"first","affiliation":[]},{"given":"Arunabha","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Debashis","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Sadhukhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,11]]},"reference":[{"issue":"10","key":"9809_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2009.5273807","volume":"47","author":"S Alexander","year":"2009","unstructured":"Alexander, S., Cheng, Y., Coan, B., Ghetie, A., Kaul, V., Siegell, B., Bellovin, S., Maxemchuk, F., Schulzrinne, H., Schwab, S., Stavrou, A., & Smith, J. (2009). The dynamic community of interest and its realization in ZODIAC. IEEE Communications Magazine, 47(10), 40\u201347.","journal-title":"IEEE Communications Magazine"},{"key":"9809_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11856214_8","volume":"4219","author":"A Arnes","year":"2006","unstructured":"Arnes, A., Valeur, F., Vigna, G., & Kemmerer, R. (2006). Using hidden Markov models to evaluate the risk of intrusions. Recent advances in intrusion detection. Lecture Notes in Computer Science, 4219, 145\u2013164.","journal-title":"Lecture Notes in Computer Science"},{"issue":"3","key":"9809_CR3","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1287\/isre.2014.0527","volume":"25","author":"T August","year":"2014","unstructured":"August, T., Niculescu, M., & Shin, H. (2014). Cloud implications on software network structure and security risks. Information Systems Research, 25(3), 489\u2013510.","journal-title":"Information Systems Research"},{"key":"9809_CR4","volume-title":"A survey of mobility modeling and analysis in wireless adhoc networks. Wireless AdHoc and sensor networks","author":"F Bai","year":"2004","unstructured":"Bai, F., & Helmy, A. (2004). A survey of mobility modeling and analysis in wireless adhoc networks. Wireless AdHoc and sensor networks. Dordrecht: Kluwer Academic Publishers."},{"key":"9809_CR5","doi-asserted-by":"crossref","unstructured":"Bhargava, S., & Agrawal, D. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. Proceedings of Vehicular Technology Conference (VTC) Fall, 4, 2143\u20132147.","DOI":"10.1109\/VTC.2001.957123"},{"issue":"6","key":"9809_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/35.925685","volume":"39","author":"L Blazevic","year":"2001","unstructured":"Blazevic, L., Buttyan, L., Capkum, S., Giordano, S., Hubaux, J., & Boudec, J. (2001). Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine, 39(6), 166\u2013174.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"9809_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMC.2005.16","volume":"4","author":"L Blazevic","year":"2005","unstructured":"Blazevic, L., Boudec, J., & Giordano, S. (2005). A location-based routing method for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 4(2), 97\u2013110.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"5","key":"9809_CR8","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.ijinfomgt.2008.02.002","volume":"28","author":"R Bojanc","year":"2008","unstructured":"Bojanc, R., & Jerman-Blazic, B. (2008). An economic modelling approach to information security risk management. International Journal of Information Management, 28(5), 413\u2013422.","journal-title":"International Journal of Information Management"},{"issue":"1","key":"9809_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.istr.2005.12.001","volume":"11","author":"J Broderick","year":"2006","unstructured":"Broderick, J. (2006). ISMS, security standards and security regulations. Information Security Technical Report, 11(1), 26\u201331.","journal-title":"Information Security Technical Report"},{"issue":"5","key":"9809_CR10","doi-asserted-by":"publisher","first-page":"749","DOI":"10.2991\/ijcis.2011.4.5.1","volume":"4","author":"F Cai","year":"2011","unstructured":"Cai, F., Ming, L., Jing, C., Li, Z., & Liu, X. (2011). A projection pursuit based risk assessment method in mobile ad hoc networks. International Journal of Computational Intelligence Systems., 4(5), 749\u2013758.","journal-title":"International Journal of Computational Intelligence Systems."},{"issue":"5","key":"9809_CR11","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing Journal, 2(5), 483\u2013502.","journal-title":"Wireless Communication & Mobile Computing Journal"},{"issue":"1","key":"9809_CR12","first-page":"303","volume":"1","author":"Y Cao","year":"2005","unstructured":"Cao, Y., & Xie, S. (2005). A position based beaconless routing algorithm for mobile ad hoc networks. Proceedings of the International Conference on Communications, Circuits and Systems, 1(1), 303\u2013307.","journal-title":"Proceedings of the International Conference on Communications, Circuits and Systems"},{"issue":"2","key":"9809_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1113034.1113068","volume":"49","author":"E Casey","year":"2006","unstructured":"Casey, E. (2006). Investigating sophisticated security breaches. Communications of the ACM, 49(2), 48\u201355.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9809_CR14","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s10796-010-9232-6","volume":"13","author":"K Chang","year":"2011","unstructured":"Chang, K., & Wang, C. (2011). Information systems resources and information security. Information Systems Frontiers, 13(4), 579\u2013593.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9809_CR15","doi-asserted-by":"publisher","first-page":"397","DOI":"10.2307\/23044049","volume":"35","author":"P Chen","year":"2011","unstructured":"Chen, P., Kataria, G., & Krishnan, R. (2011). Correlated failures, diversification, and information security risk management. MIS Quarterly, 35(2), 397\u2013422.","journal-title":"MIS Quarterly"},{"issue":"10","key":"9809_CR16","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.4304\/jsw.4.10.1091-1101","volume":"4","author":"H Dai","year":"2009","unstructured":"Dai, H., Jia, Z., & Kin, Z. (2009). Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs. Journal of Software, 4(10), 1091\u20131101.","journal-title":"Journal of Software"},{"key":"9809_CR17","unstructured":"Das, S., Mukhopadhyay, A., Sadhukhan, S., & Saha, D. (2013a). Vulnerable path determination in mobile ad-hoc networks using Markov Model. In Proceedings of the 19\n                           th\n                           Americas Conference on Information Systems (AMCIS), August 15-17, Chicago, Illinois, USA."},{"key":"9809_CR18","doi-asserted-by":"crossref","unstructured":"Das, S., Mukhopadhyay, A., & Shukla, G. (2013b). i-HOPE framework for predicting cyber breaches: a logit approach. Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), January 7\u201310, Hawaii, USA.","DOI":"10.1109\/HICSS.2013.256"},{"issue":"3","key":"9809_CR19","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.adhoc.2004.03.005","volume":"2","author":"H Deng","year":"2004","unstructured":"Deng, H., & Agrawal, D. (2004). TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks, 2(3), 291\u2013307.","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"9809_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/359205.359227","volume":"44","author":"A Ghosh","year":"2001","unstructured":"Ghosh, A., & Swaminatha, T. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51\u201357.","journal-title":"Communications of the ACM"},{"key":"9809_CR21","doi-asserted-by":"crossref","unstructured":"Giruka, V., & Singhal, M. (2005). Angular routing protocol for mobile ad-hoc networks. IEEE international conference on distributed computing systems workshops. Columbus, OH.","DOI":"10.1109\/ICDCSW.2005.42"},{"issue":"4","key":"9809_CR22","first-page":"1","volume":"2","author":"A Gupta","year":"2012","unstructured":"Gupta, A., & Ranga, S. (2012). Various routing attacks in mobile adhoc networks. International Journal of Computing and Corporate Research, 2(4), 1\u201315.","journal-title":"International Journal of Computing and Corporate Research"},{"issue":"2","key":"9809_CR23","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10796-012-9390-9","volume":"16","author":"K Hausken","year":"2014","unstructured":"Hausken, K. (2014). Returns to information security investment: Endogenizing the expected loss. Information Systems Frontiers, 16(2), 329\u2013336.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"9809_CR24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/CC.2016.7464122","volume":"13","author":"C Huang","year":"2016","unstructured":"Huang, C., Zhou, Q., & Zhang, D. (2016). Integrated wireless communication system using MANET for remote pastoral areas of Tibet. China Communications, 13(4), 49\u201357.","journal-title":"China Communications"},{"key":"9809_CR25","doi-asserted-by":"crossref","unstructured":"Hubaux, J., Buttyan, L., & Capkyun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the ACM symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 146-155, New York, NY, USA.","DOI":"10.1145\/501416.501437"},{"key":"9809_CR26","unstructured":"ISO\/IEC 27001 (2013). Information technology security techniques. Information security management systems\u2014requirements. \n                    https:\/\/www.iso.org\/standard\/54534.html\n                    \n                  . Accessed 21 Jan 2016."},{"key":"9809_CR27","unstructured":"Jang, H., Lien, Y., & Tsai, T. (2009). Rescue information system for earthquake disasters based on MANET emergency communication platform. In Proceedings of the 2009 international conference on wireless communications and mobile computing: connecting the world wirelessly, 623-627 New York, NY, USA."},{"issue":"5","key":"9809_CR28","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1287\/mnsc.1040.0357","volume":"51","author":"K Kannan","year":"2005","unstructured":"Kannan, K., & Telang, R. (2005). Market for software vulnerabilities? Think again. Management Science, 51(5), 726\u2013740.","journal-title":"Management Science"},{"key":"9809_CR29","doi-asserted-by":"crossref","unstructured":"Ko, Y. & Vaidya, N. (1998). Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 66-75 Dallas, TX, USA.","DOI":"10.1145\/288235.288252"},{"issue":"5-6","key":"9809_CR30","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.cose.2008.05.006","volume":"27","author":"E Kritzinger","year":"2008","unstructured":"Kritzinger, E., & Smith, E. (2008). Information security management : an information security retrieval and awareness model for industry. Computers & Security, 27(5-6), 224\u2013231.","journal-title":"Computers & Security"},{"issue":"5","key":"9809_CR31","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10796-007-9047-2","volume":"9","author":"P Li","year":"2007","unstructured":"Li, P., & Rao, H. R. (2007). An examination of private intermediaries\u2019 roles in software vulnerabilities disclosure. Information Systems Frontiers, 9(5), 531\u2013539.","journal-title":"Information Systems Frontiers"},{"key":"9809_CR32","unstructured":"Liu, A., Joy, A., & Thompson, R. (2004). A dynamic trust model for mobile ad hoc networks. In Proceedings of 10th IEEE Int'l Workshop Future Trends Of Distributed Computing Systems (Ftdcs '04), 80-85."},{"issue":"2","key":"9809_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.3390\/fi5020205","volume":"5","author":"G Loukas","year":"2013","unstructured":"Loukas, G., Gan, D., & Vuong, T. (2013). A review of cyber threats and defence approaches in emergency management. Future Internet., 5(2), 205\u2013236.","journal-title":"Future Internet."},{"issue":"2","key":"9809_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5296\/npa.v3i2.830","volume":"3","author":"X Lu","year":"2011","unstructured":"Lu, X., & Demirbas, M. (2011). Model-based tracking for mobile ad hoc networks. Network Protocols and Algorithms, 3(2), 1\u201323.","journal-title":"Network Protocols and Algorithms"},{"issue":"6","key":"9809_CR35","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1016\/j.jnca.2009.05.006","volume":"32","author":"R Mart\u00ed","year":"2009","unstructured":"Mart\u00ed, R., Robles, S., Mart\u00edn-Campillo, A., & Cucurull, J. (2009). Providing early resource allocation during emergencies: the mobile triage tag. Journal of Network and Computer Applications, 32(6), 1167\u20131182.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"9809_CR36","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.jnca.2012.11.001","volume":"36","author":"A Mart\u00edn-Campillo","year":"2013","unstructured":"Mart\u00edn-Campillo, A., Crowcroft, J., Yoneki, E., & Mart\u00ed, R. (2013). Evaluating opportunistic networks in disaster scenarios. Journal of Network and Computer Applications, 36(2), 870\u2013880.","journal-title":"Journal of Network and Computer Applications"},{"key":"9809_CR37","doi-asserted-by":"crossref","unstructured":"McQueen, M., Boyer, W, Flynn, M., & Beitel, G. (2006). Quantitative cyber risk reduction estimation methodology for a small SCADA Control System. In Proceedings of 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS 06). track 9, Hawaii, USA.","DOI":"10.1109\/HICSS.2006.405"},{"issue":"1","key":"9809_CR38","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"A Mishra","year":"2004","unstructured":"Mishra, A., Nadkarni, A., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48\u201360.","journal-title":"IEEE Wireless Communications"},{"issue":"6","key":"9809_CR39","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.clsr.2008.07.001","volume":"24","author":"E Morse","year":"2008","unstructured":"Morse, E., & Raval, V. (2008). PCI DSS: payment card industry data security standards in context. Computer Law & Security Review., 24(6), 540\u2013554.","journal-title":"Computer Law & Security Review."},{"key":"9809_CR40","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dss.2013.04.004","volume":"56","author":"A Mukhopadhyay","year":"2013","unstructured":"Mukhopadhyay, A., Chatterjee, S., Saha, D., Mahanti, A., & Sadhukhan, S. (2013). Cyber-risk decision models: to insure IT or not? Decision Support Systems, 56, 11\u201326.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9809_CR41","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.comcom.2007.10.021","volume":"31","author":"P Narula","year":"2008","unstructured":"Narula, P., Dhurandher, S., Misra, S., & Woungang, I. (2008). Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Computer Communications, 31(4), 760\u2013769.","journal-title":"Computer Communications"},{"key":"9809_CR42","unstructured":"NVD (2017). Data Feed and Product Integration, National Vulnerability Database. \n                    http:\/\/nvd.nist.gov\/cvss.cfm?calculator&version=2\n                    \n                  . Accessed 6 Aug 2014."},{"issue":"3","key":"9809_CR43","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s10796-010-9259-8","volume":"14","author":"E Panaousis","year":"2012","unstructured":"Panaousis, E., Politis, C., Birkos, K., Papageorgiou, C., & Dagiuklas, T. (2012). Security model for emergency real-time communications in autonomous networks. Information Systems Frontiers, 14(3), 541\u2013553.","journal-title":"Information Systems Frontiers"},{"key":"9809_CR44","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., & Haas, Z. (2003). Secure data transmission in mobile ad hoc networks. In Proceedings of ACM Workshop on Wireless Security (WiSe), San Diego, CA.","DOI":"10.1145\/941311.941318"},{"issue":"2","key":"9809_CR45","doi-asserted-by":"publisher","first-page":"317","DOI":"10.25300\/MISQ\/2015\/39.2.03","volume":"39","author":"I Park","year":"2015","unstructured":"Park, I., Sharman, R., & Rao, H. R. (2015). Disaster experience and hospital information systems: an examination of perceived information assurance, risk, resilience, and HIS usefulness. MIS Quarterly, 39(2), 317\u2013344.","journal-title":"MIS Quarterly"},{"key":"9809_CR46","doi-asserted-by":"crossref","unstructured":"Pentland, A., Fletcher, R., & Hasson, A. (2004). Daknet: rethinking connectivity in developing nations. First Mile Solutions Report.","DOI":"10.1109\/MC.2004.1260729"},{"key":"9809_CR47","doi-asserted-by":"crossref","unstructured":"Phillips, C., & Swiler, L. (1998). A graph based system for network vulnerability analysis. In Proceedings of the workshop on new security paradigms, 71-79, New York, USA.","DOI":"10.1145\/310889.310919"},{"issue":"5","key":"9809_CR48","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/49.768195","volume":"17","author":"M Pursley","year":"1999","unstructured":"Pursley, M. (1999). Routing for multimedia traffic in wireless frequency-hop communication networks. IEEE Journal on Selected Areas in Communications, 17(5), 784\u2013792.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"9809_CR49","first-page":"131","volume":"9","author":"L Qabajeh","year":"2009","unstructured":"Qabajeh, L., Kiah, L., & Qabajeh, M. (2009). A qualitative comparison of position-based routing protocols for ad-hoc networks. International Journal of Computer Science and Network Security., 9(2), 131\u2013140.","journal-title":"International Journal of Computer Science and Network Security."},{"issue":"1","key":"9809_CR50","doi-asserted-by":"publisher","first-page":"43","DOI":"10.2307\/41410405","volume":"36","author":"S Ransbotham","year":"2012","unstructured":"Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective? MIS Quarterly, 36(1), 43\u201364.","journal-title":"MIS Quarterly"},{"key":"9809_CR51","unstructured":"Sadhukhan, S., Mandal, S., & Saha, D. (2007). A heuristic technique for solving dual-homing assignment problem of 2.5g cellular networks. In Proceedings of the international conference on computing: theory and applications, March 5-7, Kolkata, India. 66-71."},{"key":"9809_CR52","doi-asserted-by":"crossref","unstructured":"Sadhukhan, S., Mandal, S., Bhaumik, P., & Saha, D. (2010). A novel direction-based diurnal mobility model for handoff estimation in cellular networks. In Proceedings of India Conference (INDICON), December 17-19, Kolkata, India.","DOI":"10.1109\/INDCON.2010.5712715"},{"key":"9809_CR53","doi-asserted-by":"crossref","unstructured":"Sadhukhan, S., Moitra, N., Venkateswaran, P., & Saha, D. (2015). A comparative study of paging techniques for diurnal mobility in dual homed cellular networks. In Proceedings of Applications and Innovations in Mobile Computing (AIMoC). February 12-14, Kolkata, India.","DOI":"10.1109\/AIMOC.2015.7083827"},{"issue":"7","key":"9809_CR54","doi-asserted-by":"publisher","first-page":"565","DOI":"10.4304\/jnw.4.7.565-579","volume":"4","author":"R Savola","year":"2009","unstructured":"Savola, R., & Abie, H. (2009). On-line and off-line security measurement framework for mobile ad hoc networks. Journal of Networks, 4(7), 565\u2013579.","journal-title":"Journal of Networks"},{"key":"9809_CR55","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(97)89531-1","volume":"6","author":"S Saxby","year":"1997","unstructured":"Saxby, S. (1997). Policies for cyberspace - illegal content on the internet. Network Security, 6, 16\u201319.","journal-title":"Network Security"},{"issue":"2","key":"9809_CR56","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/5254.850830","volume":"15","author":"E Smith","year":"2000","unstructured":"Smith, E., & Eloff, J. (2000). Cognitive fuzzy modeling for enhanced risk assessment in a health care institution. IEEE Intelligent Systems, 15(2), 69\u201375.","journal-title":"IEEE Intelligent Systems"},{"issue":"1","key":"9809_CR57","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.dss.2013.01.024","volume":"55","author":"S Sneha","year":"2013","unstructured":"Sneha, S., & Varshney, U. (2013). A framework for enabling patient monitoring via mobile ad-hoc network. Decision Support Systems, 55(1), 218\u2013234.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9809_CR58","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.adhoc.2006.05.010","volume":"5","author":"J Song","year":"2007","unstructured":"Song, J., Wong, V., & Leung, V. (2007). Secure position-based routing protocol for mobile ad hoc networks. Ad Hoc Networks, 5(1), 76\u201386.","journal-title":"Ad Hoc Networks"},{"key":"9809_CR59","unstructured":"Stoneburner, G., Goguen, A., & Feringa A. (2002). Risk management guide for information technology systems. NIST (National Institute of Technical Standards) \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-30\/sp800-30.pdf\n                    \n                  . Accessed 30 May 2015."},{"issue":"1","key":"9809_CR60","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10580530802384639","volume":"26","author":"M Sumner","year":"2009","unstructured":"Sumner, M. (2009). Information security threats: a comparative analysis of impact, probability, and preparedness. Information Systems Management, 26(1), 2\u201312.","journal-title":"Information Systems Management"},{"issue":"5","key":"9809_CR61","first-page":"21","volume":"11","author":"H Susanto","year":"2011","unstructured":"Susanto, H., Almunawar, M., & Tuan, Y. (2011). Information security management system standards: a comparative study of the big five. International Journal of Electrical & Computer Science., 11(5), 21\u201327.","journal-title":"International Journal of Electrical & Computer Science."},{"issue":"3","key":"9809_CR62","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TCOM.1984.1096061","volume":"32","author":"H Takagi","year":"1984","unstructured":"Takagi, H., & Kleinrock, L. (1984). Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications, 32(3), 246\u2013257.","journal-title":"IEEE Transactions on Communications"},{"key":"9809_CR63","unstructured":"Vasile, D. (2011). ISO27001 domains, control objectives & controls. \n                    http:\/\/www.pentest.ro\/iso-27001-domains-control-objectives-and-controls\/\n                    \n                  . Accessed 25 May 2013."},{"issue":"2","key":"9809_CR64","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cose.2005.02.002","volume":"24","author":"B Solms von","year":"2005","unstructured":"von Solms, B. (2005). Information security governance: COBIT or ISO 17799 or both? Computers & Security, 24(2), 99\u2013104.","journal-title":"Computers & Security"},{"issue":"1","key":"9809_CR65","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.cose.2012.09.013","volume":"32","author":"S Wang","year":"2013","unstructured":"Wang, S., Zhang, Z., & Kadobayashi, Y. (2013). Exploring attack graph for cost-benefit security hardening: a probabilistic approach. Computers & Security, 32(1), 158\u2013169.","journal-title":"Computers & Security"},{"issue":"1","key":"9809_CR66","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1057\/palgrave.rm.8240074","volume":"3","author":"M Warren","year":"2001","unstructured":"Warren, M. (2001). A risk analysis model to reduce computer security risks among healthcare organizations. Risk Management, 3(1), 27\u201337.","journal-title":"Risk Management"},{"issue":"3","key":"9809_CR67","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1016\/j.jnca.2005.07.008","volume":"30","author":"B Wu","year":"2007","unstructured":"Wu, B., Wu, J., Fernandez, E., Ilyas, M., & Magliveras, S. (2007). Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications, 30(3), 937\u2013954.","journal-title":"Journal of Network and Computer Applications"},{"issue":"10","key":"9809_CR68","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2009.5273810","volume":"47","author":"O Younis","year":"2009","unstructured":"Younis, O., Kant, L., Chang, K., Young, K., & Graff, C. (2009). Cognitive MANET design for mission-critical networks. IEEE Communications Magazine, 47(10), 64\u201371.","journal-title":"IEEE Communications Magazine"},{"key":"9809_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the sixth annual international conference on mobile computing and networking, Boston.","DOI":"10.1145\/345910.345958"},{"issue":"12","key":"9809_CR70","doi-asserted-by":"publisher","first-page":"4308","DOI":"10.1016\/j.camwa.2011.09.031","volume":"62","author":"F Zhao","year":"2011","unstructured":"Zhao, F., Huang, H., Jin, H., & Zhang, Q. (2011). A hybrid ranking approach to estimate vulnerability for dynamic attacks. Computers and Mathematics with Applications., 62(12), 4308\u20134321.","journal-title":"Computers and Mathematics with Applications."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9809-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9809-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9809-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T18:29:47Z","timestamp":1572028187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9809-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,11]]},"references-count":70,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9809"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9809-4","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,11]]},"assertion":[{"value":"11 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}