{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:13Z","timestamp":1773510913081,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789803","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Identification of Attack Paths Using Kill Chain and Attack Graphs"],"prefix":"10.1109","author":[{"given":"Lukas","family":"Sadlek","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Masaryk University,Brno,Czech Republic"}]},{"given":"Pavel","family":"Celeda","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Masaryk University,Brno,Czech Republic"}]},{"given":"Daniel","family":"Tovarnak","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Masaryk University,Brno,Czech Republic"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix","author":"xiong","year":"2021","journal-title":"Software and Systems Modeling"},{"key":"ref11","article-title":"CVE - Common Vulnerabilities and Exposures (CVE)","year":"1999","journal-title":"The MITRE Corporation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329853"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176339"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref15","first-page":"113","article-title":"MulVAL: A Logic-based Network Security Analyzer","volume":"8","author":"ou","year":"2005","journal-title":"USENIX Security Symposium"},{"key":"ref16","article-title":"Threat Modeling &#x2013; Uncover Security Design Flaws Using the STRIDE Approach","author":"hernan","year":"2006","journal-title":"MSDN Magazine"},{"key":"ref17","first-page":"1","article-title":"Community based plat-form for vulnerability categorization","author":"kom\u00e1rkov\u00e1","year":"2018","journal-title":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"},{"key":"ref18","article-title":"Common Vulnerability Scoring System v3.1: Specification Document","year":"0","journal-title":"FIRST-Forum of Incident Response and Security Teams"},{"key":"ref19","article-title":"Supplementary Materials: Identification of Attack Paths Using Kill Chain and Attack Graphs","author":"sadlek","year":"2022"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/978-3-319-22915-7_40","article-title":"Technical aspects of cyber kill chain","author":"yadav","year":"2015","journal-title":"Security in Computing and Communications"},{"key":"ref3","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"ref6","article-title":"MITRE ATT&CK","year":"2015","journal-title":"The MITRE Corporation"},{"key":"ref5","article-title":"The Unified Kill Chain","author":"pols","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref7","article-title":"MITRE D3FEND","year":"2021","journal-title":"The MITRE Corporation"},{"key":"ref2","author":"caralli","year":"2016","journal-title":"CERT Resilience Management Model - CERT-RMM"},{"key":"ref1","article-title":"The Hidden Costs of Cybercrime","author":"smith","year":"2020","journal-title":"McAfee San Jose CA USA Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","location":"Budapest, Hungary","start":{"date-parts":[[2022,4,25]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789803.pdf?arnumber=9789803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:48Z","timestamp":1656965388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789803","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}