{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T22:41:28Z","timestamp":1747348888112,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2002.1039705","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:34:26Z","timestamp":1056569666000},"page":"5-10","source":"Crossref","is-referenced-by-count":26,"title":["A structural framework for modeling multi-stage network attacks"],"prefix":"10.1109","author":[{"given":"K.","family":"Daley","sequence":"first","affiliation":[]},{"given":"R.","family":"Larson","sequence":"additional","affiliation":[]},{"given":"J.","family":"Dawkins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Attack modeling for information security and survivability","author":"moore","year":"2001","journal-title":"Survivability Systems Unlimited"},{"journal-title":"Motorola Intrusion Vision MIV Scottsdale Arizona","year":"2001","key":"ref11"},{"journal-title":"Reston Virgina","article-title":"Ringneck Security Console, RSC","year":"2001","key":"ref12"},{"journal-title":"Secrets and Lies","year":"2000","author":"schneier","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"key":"ref15","first-page":"54","article-title":"Modeling internet attacks","author":"tidwell","year":"2001","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security"},{"key":"ref16","article-title":"A large-scale distributed intrusion detection framework based on attack strategy analysis","author":"wicks","year":"1998","journal-title":"Applied Research and Technology"},{"key":"ref4","first-page":"203","article-title":"A brief introduction to coloured petri nets","author":"jensen","year":"1997","journal-title":"Proceeding of the TACAS'97 Workshop"},{"article-title":"An Analysis of Security Incidents on the Internet, 1989&#x2013;1995","year":"1997","author":"howard","key":"ref3"},{"key":"ref6","first-page":"11","article-title":"A pattern-matching model for misuse intrusion detection","volume":"99","author":"kumar","year":"1994","journal-title":"Proceedings of the 17th National Computer Security Conference"},{"article-title":"Classification and Detection of Computer Intrusions","year":"1995","author":"kumar","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref7","first-page":"81","article-title":"Penetration of computer systems: An overview","volume":"8","author":"lackey","year":"1974","journal-title":"Honeywell Computing Journal"},{"key":"ref2","article-title":"Modeling network attacks: Extending the attack tree paradigm","author":"dawkins","year":"2002","journal-title":"Proceedings of Third Annual International Systems Security Engineering Association Conference"},{"key":"ref1","first-page":"551","article-title":"Use of a taxonomy of security faults","author":"aslam","year":"1996","journal-title":"Proceedings of the Nineteenth NIST-NCSC National Information Systems Security Conference"},{"key":"ref9","first-page":"154","article-title":"How to systematically classify computer security","author":"lindqvist","year":"1997","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"}],"event":{"name":"International Conference on Parallel Processing Workshop","acronym":"ICPPW-02","location":"Vancouver, BC, Canada"},"container-title":["Proceedings. International Conference on Parallel Processing Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8062\/22290\/01039705.pdf?arnumber=1039705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T19:17:19Z","timestamp":1489173439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1039705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icppw.2002.1039705","relation":{},"subject":[]}}