{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:11:25Z","timestamp":1746191485834,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cnsm.2013.6727842","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T23:39:14Z","timestamp":1391211554000},"page":"235-242","source":"Crossref","is-referenced-by-count":4,"title":["A probabilistic cost-efficient approach for mobile security assessment"],"prefix":"10.1109","author":[{"given":"Martin","family":"Barrere","sequence":"first","affiliation":[]},{"given":"Gaetan","family":"Hurel","sequence":"additional","affiliation":[]},{"given":"Remi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575198"},{"key":"17","article-title":"Specification for the extensible configuration checklist description format (XCCDF)","author":"ziring","year":"2012","journal-title":"NIST"},{"journal-title":"Common Vulnerability Scoring System","year":"2013","author":"ziring","key":"18"},{"journal-title":"NIST National Institute of Standards and Technology","year":"2013","author":"barrere","key":"15"},{"key":"16","article-title":"The technical specification for the security content automation protocol (SCAP)","author":"banghart","year":"2009","journal-title":"NIST"},{"journal-title":"Common Vulnerabilities and Exposures \" Http \/\/cve Mitre Org","year":"2013","author":"foreman","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971960"},{"journal-title":"VulnXML","year":"2013","author":"foreman","key":"11"},{"journal-title":"Corporation","year":"2013","author":"foreman","key":"12"},{"key":"21","article-title":"MulVAL a logic-based network security analyzer","author":"ou","year":"2005","journal-title":"Usenix Security"},{"key":"20","article-title":"Supporting vulnerability awareness in autonomic networks and systems with oVAL","author":"barrere","year":"2011","journal-title":"Proceedings of the 7th IEEE International Conference on Network and Service Management (CNSM'11)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374792"},{"key":"23","first-page":"9","article-title":"Dynamic dependencies and performance improvement","author":"chiarini","year":"2008","journal-title":"Proceedings of the 22nd Conference on Large Installation System Administration Conference"},{"key":"24","first-page":"164","article-title":"MobiCloud a geodistributed mobile cloud computing platform","author":"xing","year":"2012","journal-title":"Proceedings of the 8th IEEE International Conference on Network and Service Management (CNSM'12)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6241"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"26"},{"journal-title":"CNF Transformer","year":"2013","author":"fielding","key":"27"},{"year":"0","author":"sperotto","key":"3"},{"year":"0","author":"sperotto","key":"2"},{"journal-title":"Vulnerability Management","year":"2010","author":"foreman","key":"10"},{"journal-title":"Cisco Visual Networking Index","year":"2013","author":"sperotto","key":"1"},{"key":"7","article-title":"Increasing android security using a lightweight oVAL-based vulnerability assessment framework","author":"barrere","year":"2012","journal-title":"Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig'12)"},{"journal-title":"Lookout Mobile Security","year":"2013","author":"shabtai","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"4","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security SEC'11 USENIX Association"},{"key":"9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"enck","year":"2009","journal-title":"Security Privacy IEEE"},{"journal-title":"OVAL Language","year":"2013","author":"barrere","key":"8"}],"event":{"name":"2013 9th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2013,10,14]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2013,10,18]]}},"container-title":["Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713382\/6727796\/06727842.pdf?arnumber=6727842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:05:59Z","timestamp":1498115159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6727842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2013.6727842","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}