{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:40:42Z","timestamp":1725745242806},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/lcn.2008.4664170","type":"proceedings-article","created":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T14:49:04Z","timestamp":1225896544000},"page":"200-206","source":"Crossref","is-referenced-by-count":9,"title":["A new approach for network vulnerability analysis"],"prefix":"10.1109","author":[{"given":"Hai L.","family":"Vu","sequence":"first","affiliation":[]},{"given":"Kenneth K.","family":"Khaw","sequence":"additional","affiliation":[]},{"given":"TY","family":"Chen","sequence":"additional","affiliation":[]},{"family":"Fei-Ching Kuo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"156","article-title":"using model checking to analyze network vulnerabilities","author":"ritchey","year":"2001","journal-title":"Proc of the IEEE Symposium on Security and Privacy"},{"key":"2","article-title":"practical attack graph generation for network defence","author":"ingols","year":"2006","journal-title":"Proc of the 22nd Annual Computer Security Applications Conf"},{"journal-title":"The Nessus vulnerability scanner","year":"2008","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"journal-title":"Asterisk","year":"2008","key":"7"},{"journal-title":"Common Vulnerability Scoring System (CVSS)","year":"2008","key":"6"},{"key":"5","first-page":"18","article-title":"an effective method to generate attack graph","author":"zhang","year":"2005","journal-title":"Proc Int Conf Machine Learning and Cybernetics"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"journal-title":"Network mapper","year":"2008","key":"9"},{"year":"2008","key":"8"},{"journal-title":"Retina Network security scanner","year":"2008","key":"11"},{"journal-title":"Wireshark","year":"2008","key":"12"}],"event":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN 2008)","start":{"date-parts":[[2008,10,14]]},"location":"Montreal, QB, Canada","end":{"date-parts":[[2008,10,17]]}},"container-title":["2008 33rd IEEE Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4656373\/4664131\/04664170.pdf?arnumber=4664170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T12:20:10Z","timestamp":1489666810000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4664170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn.2008.4664170","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}