{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:25:55Z","timestamp":1725791155817},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166456","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:31:59Z","timestamp":1512671519000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Studying cyber security threats to web platforms using attack tree diagrams"],"prefix":"10.1109","author":[{"given":"Gabriel","family":"Petrica","sequence":"first","affiliation":[]},{"given":"Sabina-Daniela","family":"Axinte","sequence":"additional","affiliation":[]},{"given":"Ioan C.","family":"Bacivarov","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Firoiu","sequence":"additional","affiliation":[]},{"given":"Ioan-Cosmin","family":"Mihai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.19107\/IJISC.2014.02.04"},{"key":"ref11","article-title":"WordPress Security 101: How to Secure Your Website Against Hackers","author":"ryckaert","year":"2014","journal-title":"Kindle Edition"},{"journal-title":"CMS technologies Web Usage Statistics","year":"2017","key":"ref12"},{"journal-title":"CVEdetails com the ultimate security vulnerability data source","year":"2017","key":"ref13"},{"journal-title":"Fourth ed","article-title":"International Standard ISO\/IEC 27000","year":"2016","key":"ref14"},{"journal-title":"ADTool manual","year":"2015","author":"kordy","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40196-1_15"},{"journal-title":"Extensible Markup Language (XML)-W3C Information and Knowledge Domain","year":"2017","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00313-4"},{"key":"ref3","article-title":"Attack Trees","author":"schneier","year":"1999","journal-title":"Dobb's Journal"},{"journal-title":"Security Measurement - White Paper","year":"2006","key":"ref6"},{"key":"ref5","article-title":"A fault tree approach to requirements analysis of an intrusion detection system","author":"helmer","year":"2001","journal-title":"Symposium on Requirements Engineering for Information Security"},{"journal-title":"Information Security Timelines and Statistics","year":"2017","key":"ref8"},{"key":"ref7","article-title":"Totul despre hackeri","author":"vasiu","year":"2001","journal-title":"Nemira Bucuresti"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.10.004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2172\/751004"},{"journal-title":"The Cisco Secure Services Client Enabling the Self-Defending Network","year":"2007","key":"ref9"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166456.pdf?arnumber=8166456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:53:56Z","timestamp":1516038836000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8166456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166456","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}