{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:37:18Z","timestamp":1764783438136,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsn.2012.6263942","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T16:04:08Z","timestamp":1345133048000},"page":"1-12","source":"Crossref","is-referenced-by-count":70,"title":["Time-efficient and cost-effective network hardening using attack graphs"],"prefix":"10.1109","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Noel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.04.001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.11"},{"key":"13","article-title":"NetKuang - A multi-host configuration vulnerability checker","author":"zerkle","year":"1996","journal-title":"Proceedings of the 6th USENIX Security Symposium"},{"key":"14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.3233\/JCS-2002-101-209","article-title":"Model-based analysis of configuration vulnerabilities","volume":"10","author":"ramakrishnan","year":"2002","journal-title":"Journal of Computer Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/DISCEX.2001.932182","article-title":"Computer-attack graph generation tool","volume":"2","author":"swiler","year":"2001","journal-title":"Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX 2001)"},{"journal-title":"Nessus Vulnerability Scanner","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176275"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"journal-title":"Towards Quantitative Evaluation of Computer Security","year":"1994","author":"dacier","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"}],"event":{"name":"2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253623\/6263904\/06263942.pdf?arnumber=6263942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T18:39:50Z","timestamp":1562092790000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dsn.2012.6263942","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}