{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:46:38Z","timestamp":1730285198961,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/netsoft.2018.8459961","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:43:41Z","timestamp":1536875021000},"page":"356-361","source":"Crossref","is-referenced-by-count":10,"title":["Utilizing attack enumerations to study SDN\/NFV vulnerabilities"],"prefix":"10.1109","author":[{"given":"Quang-Vinh","family":"Dang","sequence":"first","affiliation":[]},{"given":"Jerome","family":"Francois","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp040"},{"key":"ref11","first-page":"231","article-title":"Associating the severity of vulnerabilities with their description","volume":"249","author":"toloudis","year":"2016","journal-title":"CAiSE Workshops"},{"key":"ref12","first-page":"111","article-title":"Security trend analysis with CVE topic models","author":"neuhaus","year":"2010","journal-title":"ISSRE"},{"key":"ref13","first-page":"1","article-title":"Ranking attacks based on vulnerability analysis","author":"wang","year":"2010","journal-title":"HICSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.25"},{"journal-title":"Efficient Estimation of Word Representations in Vector Space","year":"2013","author":"mikolov","key":"ref15"},{"journal-title":"A recommender system in the cyber defense domain","year":"2014","author":"lyons","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"69:1","DOI":"10.1145\/3012704","article-title":"A survey of link prediction in complex networks","volume":"49","author":"mart\u00ednez","year":"2017","journal-title":"ACM Comput Surv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2009-00335-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0141-9"},{"journal-title":"Common Weakness Enumeration (CWE)","year":"2018","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"journal-title":"Common Attack Pattern Enumeration and Classification (CAPEC)","year":"2018","key":"ref3"},{"key":"ref6","first-page":"144","article-title":"Huma: A multi-layer framework for threat analysis in a heterogeneous log environment","volume":"10723","author":"navarro","year":"2017","journal-title":"FPS"},{"journal-title":"Common Vulnerabilities and Exposures (CVE)","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.63"},{"key":"ref7","first-page":"436","article-title":"The CAPEC based generator of attack scenarios for network security evaluation","author":"kotenko","year":"2015","journal-title":"IDAACS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"key":"ref9","article-title":"Interactive visualization and text mining for the capec cyber attack catalog","author":"noel","year":"2015","journal-title":"Proceedings of the ACM Intelligent User Interfaces Workshop on Visual Text Analytics"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753203"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/117\/38002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803"},{"key":"ref23","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2000","journal-title":"NIPS"},{"key":"ref26","article-title":"Predicting positive and negative links in online social networks","author":"leskovec","year":"2010","journal-title":"WWW"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"}],"event":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","start":{"date-parts":[[2018,6,25]]},"location":"Montreal, QC","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8429968\/8458492\/08459961.pdf?arnumber=8459961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:27:29Z","timestamp":1643189249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8459961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2018.8459961","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}