{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:56:28Z","timestamp":1725396988652},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ccst.2014.6987040","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T19:57:56Z","timestamp":1419969476000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative evaluation of attack\/defense scenarios through Decision Network modelling and analysis"],"prefix":"10.1109","author":[{"given":"Daniele","family":"Codetta-Raiteri","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Portinale","sequence":"additional","affiliation":[]},{"given":"Roberta","family":"Terruggia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-642-40196-1_15"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-0-387-68282-2"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1151454.1151493"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1002\/sec.299"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1456362.1456368"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/S0951-8320(99)00043-5"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/PSCE.2009.4840267"},{"key":"ref8","first-page":"370","article-title":"Attack plan recognition and prediction using causal networks","author":"qin","year":"2004","journal-title":"Proc 20th Annu Comput Secur Appl Conf"},{"year":"2013","author":"kordy","article-title":"Dag-based attack and defense modeling: Don't miss the forest for the attack trees","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1093\/logcom\/exs029"},{"key":"ref9","first-page":"211","article-title":"Using Bayesian Networks for cyber-security analysis","author":"xie","year":"2010","journal-title":"Proceedings of IEEE Int Conf on Dependable Systems and Networks"},{"year":"2000","author":"schneier","journal-title":"Secrets and Lies Digital Security in a Networked World","key":"ref1"}],"event":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2014,10,13]]},"location":"Rome, Italy","end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6961037\/6986962\/06987040.pdf?arnumber=6987040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:31:13Z","timestamp":1490301073000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6987040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ccst.2014.6987040","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}