{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T12:59:13Z","timestamp":1758632353045},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/atnac.2018.8615386","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:49:51Z","timestamp":1547772591000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["Security threat probability computation using Markov Chain and Common Vulnerability Scoring System"],"prefix":"10.1109","author":[{"given":"Ngoc T.","family":"Le","sequence":"first","affiliation":[]},{"given":"Doan B.","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2003.07.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.03.011"},{"journal-title":"The Treacherous Twelve - Cloud Computing Top Threatsin","year":"2016","author":"alliance","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"journal-title":"Introduction to Probability Models","year":"2014","author":"ross","key":"ref16"},{"journal-title":"National Vulnerability Database","year":"2018","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.10.3.184-194"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v18i4.1329"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215355"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-55r1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215374"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2015.7366799"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SWSTE.2016.13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-011-0177-1"},{"journal-title":"The CIS Security Metrics","year":"2010","key":"ref2"},{"journal-title":"Lord Kelvin Electrical units of measurement Popular lectures and addresses","year":"1889","author":"thomson","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"journal-title":"Critical Infrastructure protection In Homeland Security Defending a Networked Nation","year":"2014","author":"lewis","key":"ref20"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-64653-4_1","article-title":"Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies","author":"hoang","year":"2017","journal-title":"Guide to Security in SDN and NFV Springer"}],"event":{"name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2018,11,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2018,11,23]]}},"container-title":["2018 28th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598648\/8615121\/08615386.pdf?arnumber=8615386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:02:20Z","timestamp":1643241740000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8615386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/atnac.2018.8615386","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}