{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:26:35Z","timestamp":1757543195360},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s10922-005-6292-x","type":"journal-article","created":{"date-parts":[[2005,9,13]],"date-time":"2005-09-13T06:03:53Z","timestamp":1126591433000},"page":"253-267","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks"],"prefix":"10.1007","volume":"13","author":[{"given":"J.","family":"Dawkins","sequence":"first","affiliation":[]},{"given":"K.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"G.","family":"Manes","sequence":"additional","affiliation":[]},{"given":"M.","family":"Papa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6292_CR1","unstructured":"N. Muller, Convergence: The Next Revolution in Telecommunications, Artech, 1999."},{"key":"6292_CR2","unstructured":"Fyodor, The Art of Port Scanning, http:\/\/www.insecure.org, 2002."},{"key":"6292_CR3","doi-asserted-by":"crossref","unstructured":"T. Kosloff, Attacks on public telephone networks: Technologies and challenges. Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement, 2003.","DOI":"10.1117\/12.500826"},{"key":"6292_CR4","unstructured":"G. Vigna, F. Valeur, J. Zhou, and R. A. Kemmerer, Comoposable Tools for Network Discovery and Security Analyses. Proceedings of the Annual Computer Security Applications Conference, 2002."},{"key":"6292_CR5","doi-asserted-by":"crossref","unstructured":"B. Skaggs, B. Blackburn, G. Manes, and S. Shenoi, Network Vulnerability Analysis. Proceedings of the IEEE 45gh Midwest Symposium on Circuits and Systems, 2002.","DOI":"10.1109\/MWSCAS.2002.1187081"},{"key":"6292_CR6","unstructured":"General Dynamic, Inc. Motorola Intrusion Vision."},{"key":"6292_CR7","unstructured":"Ringneck Technologies, Inc. Ringneck Security Console."},{"key":"6292_CR8","unstructured":"G. Lorenz, Public Telephone Network Vulnerabilities. Advances in Data and Applications Security."},{"key":"6292_CR9","unstructured":"C. Campbell, J. Dawkins, R. Larson, K. Fitch, and T. Tidwell, Network Modeling for Vulnerability Analysis. Proceedings of the Third Annual International Systems Security Engineering Association Conference, 2002, 2002."},{"key":"6292_CR10","unstructured":"J. Dawkins, C. Campbell, R. Larson, K. Fitch, and T. Tidwell, Modeling Network Attacks: Extending the Attack Tree Paradigm. Proceedings of the Third Annual International Systems Security Engineering Association Conference, 2002."},{"key":"6292_CR11","volume-title":"Secrets and Lies","author":"B. Schneier","year":"2000","unstructured":"B. Schneier, Secrets and Lies, Wiley, San Francisco, CA, 2000."},{"key":"6292_CR12","unstructured":"American Nation Standards Institute. SS7 Integrated Services Digital Network User Part."},{"key":"6292_CR13","unstructured":"GR-82: Signaling Transfer Point Generic Reuirements, Telcordia, 2001."},{"key":"6292_CR14","unstructured":"J. Somesh, J. Wing, and O. Sheyner, Minimization and reliability analysis of attack graphs, Carnegie Mellon University, 2002."},{"key":"6292_CR15","doi-asserted-by":"crossref","unstructured":"O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated Generation and Analysis of Attack Graphs. Proceedings of the IEEE Symposium on Security and Privacy, June, 2002.","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"6292_CR16","unstructured":"J. Andrews, T. Reliability Moss, and Risk Assesment, The American Society of Mechanical Engineers, 2002."},{"key":"6292_CR17","unstructured":"N. Leveson, Safeware: System Safety and Computers, New York, 1995."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6292-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-005-6292-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6292-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T11:34:38Z","timestamp":1586432078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-005-6292-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["6292"],"URL":"https:\/\/doi.org\/10.1007\/s10922-005-6292-x","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}