{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:21:14Z","timestamp":1763140874455,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/snpd.2016.7515951","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:38:58Z","timestamp":1469565538000},"page":"517-522","source":"Crossref","is-referenced-by-count":35,"title":["Network security risk assessment method based on HMM and attack graph model"],"prefix":"10.1109","author":[{"given":"Si-chao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.013"},{"key":"ref11","article-title":"MulVAL: A Logic-based Network Security Analyzer[C]","author":"ou","year":"2005","journal-title":"Usenix Security"},{"key":"ref12","first-page":"25","article-title":"Analytical approach to attack graph analysis for network security[C].\/\/Availability Reliability, and Security","author":"kijsanayothin","year":"2010","journal-title":"ARES'10 International Conference on"},{"key":"ref13","first-page":"211","article-title":"Using Bayesian networks for cyber security analysis [C].\/\/Dependable Systems and Networks (DSN)","author":"xie","year":"2010","journal-title":"2010 IEEE\/IFIP International Conference on IEEE"},{"key":"ref14","first-page":"4131","article-title":"Attack graph model based on extended Markov chain[J]","volume":"35","author":"qi","year":"2014","journal-title":"Computer Engineering and Design"},{"key":"ref15","first-page":"146","article-title":"Research on network security risk assessment method combined with attack graph and HMM[J]","volume":"28","author":"liu","year":"2015","journal-title":"Journal of Xinyang Normal University"},{"key":"ref16","first-page":"2","article-title":"Research on network security evaluation technology based on attack graph model [D]","author":"cheng","year":"2012","journal-title":"Shanghai School of Information Security Engineering Shanghai Jiao Tong University"},{"key":"ref17","first-page":"5","article-title":"Research on hidden markov model clustering and it's applications","author":"lu","year":"2007"},{"key":"ref18","first-page":"145","article-title":"Using hidden markov models to evaluate the risks of intrusions[C]","author":"\u00e5mes","year":"2006","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.01987"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532071"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref2","first-page":"29","article-title":"Study of network security evaluation based on attack graph model [J]","volume":"28","author":"wang","year":"2007","journal-title":"Journal on Communications"},{"key":"ref1","first-page":"1","article-title":"A survey of computer vulnerability assessment [J]","volume":"27","author":"xing","year":"2004","journal-title":"Chinese Journal of Computers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.21"}],"event":{"name":"2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2016,5,30]]},"location":"Shanghai","end":{"date-parts":[[2016,6,1]]}},"container-title":["2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7510515\/7515861\/07515951.pdf?arnumber=7515951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T21:43:38Z","timestamp":1592516618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7515951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/snpd.2016.7515951","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}