{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:40:15Z","timestamp":1725475215509},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423590","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"136-139","source":"Crossref","is-referenced-by-count":0,"title":["Automatic generation of extended dependency graphs for network security"],"prefix":"10.1109","author":[{"given":"Heiko","family":"Gunther","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Wachtberg, Germany"}]},{"given":"Marko","family":"Jahnke","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Wachtberg, Germany"}]}],"member":"263","reference":[{"journal-title":"M-CDSA Model-based Cyber Defense Situational Awareness","year":"2012","author":"klein","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402970"},{"journal-title":"Automating Network Application Dependency Discovery","year":"0","author":"chen","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3990\/2.14"},{"key":"3","article-title":"ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment","author":"foo","year":"2005","journal-title":"International Conference on Dependable Systems and Networks"},{"key":"2","article-title":"Mission cyber security situation assessment using impact dependency graphs","author":"jakobson","year":"2011","journal-title":"14th International Conference on Information Fusion"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/b12461","article-title":"Situation awareness: Progress and directions","author":"endsley","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298314"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.23"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423590.pdf?arnumber=6423590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T17:11:00Z","timestamp":1623172260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6423590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423590","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}