{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:18:38Z","timestamp":1767183518968},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838309","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-9","source":"Crossref","is-referenced-by-count":11,"title":["A SAT-based autonomous strategy for security vulnerability management"],"prefix":"10.1109","author":[{"given":"Martin","family":"Barrere","sequence":"first","affiliation":[]},{"given":"Remi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/SECPRI.2002.1004377","article-title":"Automated generation and analysis of attack graphs","author":"sheyner","year":"2002","journal-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy SP '02"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374792"},{"key":"18","first-page":"9","article-title":"Dynamic dependencies and performance improvement","author":"chiarini","year":"2008","journal-title":"Proceedings of the 22nd Conference on Large Installation System Administration Conference"},{"journal-title":"Netconf4J","year":"2013","key":"33"},{"key":"15","article-title":"Supporting vulnerability awareness in autonomic networks and systems with OVAL","author":"barr?ere","year":"2011","journal-title":"Proceedings of the 7th IEEE International Conference on Network and Service Management (CNSM'11)"},{"journal-title":"MulVAL A Logic-based Network Security Analyzer","year":"2005","author":"ou","key":"16"},{"journal-title":"CVSS Common Vulnerability Scoring System","year":"2013","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575198"},{"journal-title":"NIST National Institute of Standards and Technology","year":"2013","key":"11"},{"key":"12","article-title":"The technical specification for the security content automation protocol (SCAP)","author":"banghart","year":"2009","journal-title":"NIST"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.031105"},{"key":"23","first-page":"71","article-title":"Improving IT change management processes with automated risk assessment","author":"wickboldt","year":"2009","journal-title":"Proceedings of IEEE International Workshop on Distributed Systems Operations and Management (DSOM'09)"},{"journal-title":"The Internet Engineering Task Force (IETF)","year":"2013","key":"24"},{"key":"25","first-page":"83","article-title":"NETCONF interoperability testing","author":"tran","year":"2009","journal-title":"Proceedings of the Third International Conference on Autonomous Infrastructure Management and Security (AIMS'09)"},{"key":"26","first-page":"22","article-title":"Automating network and service configuration using NETCONF and YANG","author":"wallin","year":"2011","journal-title":"Proceedings of the 25th International Conference on Large Installation System Administration LISA'11"},{"journal-title":"NVD national vulnerability database","year":"2013","key":"27"},{"key":"28","article-title":"Collaborative remediation of configuration vulnerabilities in autonomic networks and systems","author":"barr?ere","year":"2012","journal-title":"Proceedings of the 8th IEEE International Conference on Network and Service Management (CNSM'12)"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"2006","author":"hopcroft","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"journal-title":"Vulnerability Management","year":"2010","author":"foreman","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971960"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"journal-title":"The Greenery Project","year":"2013","key":"30"},{"journal-title":"OVAL Language","year":"2013","key":"7"},{"key":"6","article-title":"Specification for the Extensible Configuration Checklist Description Format (XCCDF)","author":"ziring","year":"2012","journal-title":"NIST"},{"journal-title":"AIMA","year":"2013","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6241"},{"journal-title":"GNS3","year":"2013","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-004-0183-4"},{"journal-title":"MITRE Corporation","year":"2013","key":"9"},{"journal-title":"CVE Common Vulnerabilities and Exposures","year":"2013","key":"8"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838309.pdf?arnumber=6838309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:26:11Z","timestamp":1498152371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838309","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}