{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:10:01Z","timestamp":1761513001002,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949385","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"60-67","source":"Crossref","is-referenced-by-count":13,"title":["Modeling cyber conflicts using an extended Petri Net formalism"],"prefix":"10.1109","author":[{"given":"Anita N.","family":"Zakrzewska","sequence":"first","affiliation":[]},{"given":"Erik M.","family":"Ferragut","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"An annotated review of past papers on attack graphs","author":"lippmann","year":"2005","journal-title":"Tech Rep PR-IA-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-540-30101-1_17","article-title":"Tools for generating and analyzing attack graphs","author":"sheyner","year":"2004","journal-title":"Formal Methods for Components and Objects"},{"key":"ref13","article-title":"Pratical attack graph generation for network defense","author":"ingols","year":"2006","journal-title":"Computer Security Applications Conference"},{"key":"ref14","first-page":"18","article-title":"Identifying critical attack assets in dependency attack graphs","author":"sawilla","year":"2008","journal-title":"European symposium on research in computer security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.05.002"},{"key":"ref16","first-page":"296","article-title":"Reactive petri nets for workflow modeling","author":"eshuis","year":"2003","journal-title":"Proc 24th Int Conf Applications and Theory of Petri Nets"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.40"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168093"},{"key":"ref19","article-title":"A stochastic game nets based approach for network security analysis","author":"lin","year":"2008","journal-title":"29th International Conference on Application and Theory of Petri Nets and other Models of Concurrency Concurrency methods Issues and Applications 2008 Workshop"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.35"},{"year":"0","key":"ref3","article-title":"Common attack pattern enumeration and classification"},{"key":"ref6","article-title":"The use of attack trees in assessing vulnerabilities in scada systems","author":"byres","year":"2004","journal-title":"International Infrastructure Survivability Workshop"},{"key":"ref5","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"key":"ref8","article-title":"Modeling internet attacks","author":"tidwell","year":"2001","journal-title":"the 2001 IEEE Workshop on Information Assurance and Security"},{"key":"ref7","article-title":"Attack modeling for information security and survivability","author":"moore","year":"2001","journal-title":"Carnegie Mellon Software Engineering Institute Tech Rep CMU\/SEI-2001-TN-01"},{"key":"ref2","article-title":"Avoidit: A cyber attack taxonomy","author":"shiva","year":"2009","journal-title":"Technical Report CS-09-003 University of Memphis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852704"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949385.pdf?arnumber=5949385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:10:51Z","timestamp":1497913851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949385","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}