{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:56:26Z","timestamp":1764053786443,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1109\/ciot53061.2022.9766588","type":"proceedings-article","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T20:07:05Z","timestamp":1652126825000},"page":"24-31","source":"Crossref","is-referenced-by-count":7,"title":["Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment"],"prefix":"10.1109","author":[{"given":"Antoine","family":"Boudermine","sequence":"first","affiliation":[{"name":"Polytechnic Institute of Paris T&#x00E9;l&#x00E9;com Paris,LTCI,France"}]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of Paris T&#x00E9;l&#x00E9;com Paris,LTCI,France"}]},{"given":"Jean-Henri","family":"Choyer","sequence":"additional","affiliation":[{"name":"CERT Naval Group,France"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.adhoc.2018.10.024","article-title":"Cost-aware securing of IoT systems using attack graphs","volume":"86","author":"yigit","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2019.106546"},{"key":"ref15","first-page":"63","article-title":"A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System","author":"sultan","year":"2017","journal-title":"CyberICPS'2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.21"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170813"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2018.8691321"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref5","first-page":"156","article-title":"Using model checking to analyse network vulnerabilities","author":"ritchey","year":"0","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/9789812836243_0013","article-title":"Topological Vulnerability Analysis: A Powerful New Approach For Network Attack Prevention, Detection, and Response","volume":"3","author":"jajodia","year":"2008","journal-title":"Statistical Science and Interdisciplinary Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"journal-title":"W32 stuxnet Dossier","year":"2011","author":"falliere","key":"ref2"},{"key":"ref1","article-title":"Navigating the SolarWinds Supply Chain Attack","volume":"56","author":"wolff","year":"2021","journal-title":"The Procurement Lawyer"},{"key":"ref9","article-title":"MulVAL: A Logic-based Network Security Analyzer","author":"ou","year":"0","journal-title":"Proceedings of the 14th USENIX Security Symposium"}],"event":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","start":{"date-parts":[[2022,3,28]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2022,3,30]]}},"container-title":["2022 5th Conference on Cloud and Internet of Things (CIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9766426\/9766387\/09766588.pdf?arnumber=9766588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:44:18Z","timestamp":1655239458000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9766588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ciot53061.2022.9766588","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]}}}