{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:02:12Z","timestamp":1755799332363},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5345951","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T19:44:31Z","timestamp":1260474271000},"page":"1171-1175","source":"Crossref","is-referenced-by-count":8,"title":["A review of classification methods for network vulnerability"],"prefix":"10.1109","author":[{"given":"Shuyuan","family":"Jin","sequence":"first","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","first-page":"603","article-title":"Testing for software vulnerability using environment perturbation. Proceeding of the International Conference on Dependable Systems and Networks (DSN 2000)","author":"du","year":"2000","journal-title":"Workshop On Dependability Versus Malicious Faults"},{"year":"0","key":"18"},{"article-title":"Computer Vulnerability Analysis","year":"1997","author":"krsul","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)88289-2"},{"journal-title":"Specification and Classification of Generic Security Flaws for the Tester's Assistant Library","year":"1996","author":"dodson","key":"13"},{"year":"0","key":"14"},{"key":"11","article-title":"A taxonomy of causes of software vulnerabilities in internet software[C ]","author":"piessens","year":"2002","journal-title":"Proc 12th Int Symposium Software Reliability Engineering"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"22","article-title":"Update: CERT\/CC Vulnerability Knowledge base","author":"longstaff","year":"1997","journal-title":"Technical pre-sentation at a DARPA workshop in Savannah"},{"journal-title":"An analysis of security incidents on the internet 198921995[D]","year":"1997","author":"howard","key":"23"},{"year":"0","key":"24"},{"key":"25","article-title":"Vulnerabilities analysis","author":"bishop","year":"1999","journal-title":"8th Int Symp Recent Advances in Intrusion Detection"},{"key":"26","first-page":"2","article-title":"Is your network inviting an attack","author":"knight","year":"2000","journal-title":"Internet Security Advisor (5\/6)"},{"journal-title":"A quantitative risk evaluation method for computer system and network security","year":"2002","author":"wang","key":"27"},{"journal-title":"A Taxonomy of Network and Computer Attack Methodologies","year":"2003","author":"hansman","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483667"},{"year":"0","key":"3"},{"journal-title":"Firewalls and Internet Security Repelling the Wily Hacker","year":"1994","author":"cheswick","key":"2"},{"journal-title":"Software Vulnerability Analysis","year":"1998","author":"krsul","key":"10"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.IR.76-1041","article-title":"Security analysis and enhancements of computer operating systems","author":"abbott","year":"1976"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1243\/0954405041897059"},{"year":"0","key":"5"},{"journal-title":"Fundamentals of Computer Security Technology","year":"1994","author":"amoroso","key":"4"},{"journal-title":"A Taxonomy of Security Faults in the UNIX operating system","year":"1995","author":"aslam","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1147\/sj.133.0230"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2009,10,11]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05345951.pdf?arnumber=5345951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T12:25:31Z","timestamp":1558700731000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5345951","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}