{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:10:58Z","timestamp":1730283058454,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/milcom.2015.7357465","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:54:21Z","timestamp":1450371261000},"page":"336-341","source":"Crossref","is-referenced-by-count":4,"title":["Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge"],"prefix":"10.1109","author":[{"given":"James","family":"Morris-King","sequence":"first","affiliation":[]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2011.04.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009500516378"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.envint.2006.06.005"},{"key":"ref13","article-title":"Towards the development of a defensive cyber damage and mission impact methodology. No. AFIT\/GIR\/ENV\/07-M9","author":"fortson","year":"2007","journal-title":"AIR FORCE INST of TECH WRIGHT-PATTERSON AFB OH SCHOOL of ENGINEERING"},{"journal-title":"Information Assurance (security in the information environment)","year":"2006","author":"blyth","key":"ref14"},{"key":"ref15","first-page":"4","article-title":"Network risk assessment tool (NRAT)","author":"whiteman","year":"2008","journal-title":"IA Newsletter 11"},{"journal-title":"Resilience Strategies for Network Challenge Detection Identification and Remediation","year":"2013","author":"yu","key":"ref16"},{"key":"ref17","first-page":"149","article-title":"How to Own the Internet in Your Spare Time","author":"staniford","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/science.1116681"},{"key":"ref4","article-title":"Dne: A method for extracting cascaded diffusion networks from social networks. Privacy, Security, Risk and Trust (PASSAT) and 2011","author":"eslami","year":"2011","journal-title":"IEEE Third International Conference on Social Computing (SocialCom) 2011 IEEE Third International Conference on IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2007.04.029"},{"key":"ref5","article-title":"Environmental Management in Practice: Instruments for environmental management","volume":"1","author":"nath","year":"1998"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2010.10.003"},{"key":"ref7","first-page":"155","article-title":"Positive feedback and ecosystem organization","author":"deangelis","year":"1991","journal-title":"Theoretical Studies of Ecosystems The Network Perspective"},{"key":"ref2","article-title":"Network Centric Warfare: Developing and Leveraging Information Superiority","author":"alberts","year":"2000","journal-title":"Assistant Secretary of Defense (C3I\/Command Control Research Program) Washington DC"},{"key":"ref9","article-title":"A study to determine damage assessment methods or models on Air Force networks","author":"thiem","year":"2005","journal-title":"No AFIT\/GIR\/ENV\/05M-18 Air Force Institute of technology Wright-Patterson AFB OH School of Management and Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COM-M.2006.248156"},{"key":"ref20","first-page":"509","article-title":"Environmental Science: A Canadian Perspective","author":"freedman","year":"1998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459989"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014814226148"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2005.08.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/637241.637244"},{"journal-title":"Systems approach to the concept of environment","year":"1978","author":"patten","key":"ref25"}],"event":{"name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","start":{"date-parts":[[2015,10,26]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2015,10,28]]}},"container-title":["MILCOM 2015 - 2015 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347040\/7357245\/07357465.pdf?arnumber=7357465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:37:06Z","timestamp":1490387826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7357465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/milcom.2015.7357465","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}