{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T08:56:54Z","timestamp":1768985814175,"version":"3.49.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041418","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"48-53","source":"Crossref","is-referenced-by-count":4,"title":["RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0691-8931","authenticated-orcid":false,"given":"Ghanshyam S.","family":"Bopche","sequence":"first","affiliation":[{"name":"National Institute of Technology,Department of Computer Applications,Tiruchirappalli,India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0232-321X","authenticated-orcid":false,"given":"Gopal N.","family":"Rai","sequence":"additional","affiliation":[{"name":"Collins Aerospace India (Pvt.) Limited,Hyderabad,India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2105-6578","authenticated-orcid":false,"given":"Deepnarayan","family":"Tiwari","sequence":"additional","affiliation":[{"name":"National Payments Corporation of India (NPCI),Mumbai,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Countdown to zero day: Stuxnet and the launch of the worlds first digital weapon","author":"Zetter","year":"2015","journal-title":"Crown"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254313"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00533-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102722"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17016-9_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.58"},{"key":"ref13","volume-title":"Cauldron by CyVision"},{"key":"ref14","volume-title":"FireMon Risk Analyzer"},{"key":"ref15","volume-title":"Skybox Security"},{"key":"ref16","volume-title":"Scenario Graphs and Attack Graphs Project Webpage"},{"key":"ref17","volume-title":"NetSPA: a network security planning architecture","author":"Artz","year":"2002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30101-1_17"},{"key":"ref19","first-page":"8","article-title":"MulVAL: A logic-based network security analyzer","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14","author":"Ou"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228667"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"ref25","volume-title":"A heuristic approach to network hardening using attack graphs","author":"Islam","year":"2009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04612-9_4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05171-6_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.07.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ada387544"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2015.37"},{"key":"ref31","first-page":"75","article-title":"Modeling network attacks: Extending the attack tree paradigm","volume-title":"Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection","author":"Dawkins"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_14"},{"key":"ref33","doi-asserted-by":"crossref","volume-title":"Attack trees","author":"Schneier","DOI":"10.1002\/9781119183631.ch21"},{"key":"ref34","volume-title":"SecurelTree by Amenaza Technologies [online]"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1142\/9789812836243_0013"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-010-0266-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684494"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102938"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2665936.2665939"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1860-3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.543-550"},{"key":"ref48","volume-title":"National Vulnerability Database"},{"key":"ref49","volume-title":"Bugtraq"},{"key":"ref50","volume-title":"Statistical analysis of computer network security","author":"Kap","year":"2013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60080-2_20"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683482"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00506-6"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2023,1,3]]},"end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041418.pdf?arnumber=10041418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:28:05Z","timestamp":1707830885000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041418","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}