{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:46:49Z","timestamp":1769510809049,"version":"3.49.0"},"reference-count":48,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Technometrics"],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1080\/00401706.2016.1256841","type":"journal-article","created":{"date-parts":[[2016,11,15]],"date-time":"2016-11-15T22:29:40Z","timestamp":1479248980000},"page":"508-520","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":46,"title":["A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning"],"prefix":"10.1080","volume":"59","author":[{"given":"Maochao","family":"Xu","sequence":"first","affiliation":[{"name":"Department of Mathematics, Illinois State University, Normal, Illinois"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8825-0180","authenticated-orcid":false,"given":"Lei","family":"Hua","sequence":"additional","affiliation":[{"name":"Division of Statistics, Northern Illinois University, DeKalb, Illinois"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at San Antonio, San Antonio, Texas"}]}],"member":"301","published-online":{"date-parts":[[2017,4,28]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.insmatheco.2007.02.001"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1002\/jae.842"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1031689016"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2000.10474303"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"cit0007","doi-asserted-by":"crossref","first-page":"e0131501","DOI":"10.1371\/journal.pone.0131501","volume":"10","author":"Chen Y. Z.","year":"2015","journal-title":"PLOS One"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/49.464717"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.jedc.2010.06.021"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2011.04.001"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2012.08.010"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1998.10474117"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2012-1_26"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1080\/10920277.1998.10595749"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35407-6_5"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2006.00718.x"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1002\/jae.800"},{"key":"cit0019","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/863955.863968","author":"Hussain A.","year":"2003","journal-title":"Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications"},{"key":"cit0020","first-page":"450","author":"Ishida C.","year":"2005","journal-title":"2005 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1201\/b13150"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1201\/b17116"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.jimonfin.2006.04.007"},{"key":"cit0024","unstructured":"Khoudraji, A. (1995), \u201cContributiona L\u2019\u00e9tude Des Copules eta La Mod\u00e9lisation De Valeurs Extr\u00eames Multivari\u00e9es,\u201d Ph.D. dissertation, Universit\u00e9 Laval."},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.19"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0983-4"},{"key":"cit0027","volume-title":"Dependence Modeling: Vine Copula Handbook","author":"Kurowicka D.","year":"2011"},{"key":"cit0028","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1109\/ICSMC.2000.886455","author":"Lau F.","year":"2000","journal-title":"IEEE International Conference on Systems, Man, and Cybernetics"},{"key":"cit0029","volume-title":"High Performance Cloud Auditing and Applications","author":"Luo W.","year":"2014"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1142\/9789814299886_0009"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2013.822830"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2010.07.016"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1002\/047120644X"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71297-8_34"},{"key":"cit0037","author":"Pendleton M.","journal-title":"ACM Computing Survey"},{"key":"cit0038","unstructured":"Reveron, D. S. (2012),Cyberspace and National Security, Washington, DC: Georgetown University Press."},{"key":"cit0039","first-page":"229","volume":"8","author":"Sklar A.","year":"1959","journal-title":"Publications de l\u2019Institut de statistique de l\u2019University? de Paris"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1996.10476697"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2002.1029997"},{"key":"cit0042","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/1879141.1879149","author":"Wustrow E.","year":"2010","journal-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2014.902407"},{"key":"cit0044","first-page":"14","author":"Xu S.","year":"2014","journal-title":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2007.160"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279800"},{"key":"cit0047","first-page":"256","author":"\u2014\u2014\u2014","year":"2014","journal-title":"Proceedings of the 6th International Conference on Trustworthy Systems"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422261"}],"container-title":["Technometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00401706.2016.1256841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T18:50:27Z","timestamp":1657738227000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00401706.2016.1256841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,28]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10,2]]}},"alternative-id":["10.1080\/00401706.2016.1256841"],"URL":"https:\/\/doi.org\/10.1080\/00401706.2016.1256841","relation":{},"ISSN":["0040-1706","1537-2723"],"issn-type":[{"value":"0040-1706","type":"print"},{"value":"1537-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utch20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utch20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2016-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-01","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}