{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:36:38Z","timestamp":1775230598339,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010218","name":"Department of Science and Technology","doi-asserted-by":"publisher","award":["DST\/TDT\/DDP-30\/2021"],"award-info":[{"award-number":["DST\/TDT\/DDP-30\/2021"]}],"id":[{"id":"10.13039\/501100010218","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tdsc.2023.3253121","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T18:50:20Z","timestamp":1678128620000},"page":"298-308","source":"Crossref","is-referenced-by-count":5,"title":["Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3395-9942","authenticated-orcid":false,"given":"Urvashi","family":"Bansal","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Jalandhar, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4795-1842","authenticated-orcid":false,"given":"Geeta","family":"Sikka","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8396-9025","authenticated-orcid":false,"given":"Lalit K.","family":"Awasthi","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Srinagar, Uttarakhand, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3803-8672","authenticated-orcid":false,"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.019"},{"key":"ref6","article-title":"Common vulnerabilities and exposures","year":"1999"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2020070102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2020100101"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2021040101"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2012.6375383"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.09.031"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_5"},{"key":"ref15","article-title":"Nessus vulnerability scanner","author":"Yoran","year":"2002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2012.6483149"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2015.7108194"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_1"},{"issue":"12","key":"ref22","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr Dobbs J."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDCON.2012.6420675"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2013.6682816"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1891"},{"key":"ref27","first-page":"1","article-title":"The state explosion problem","author":"Kot","year":"2003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2012.50"},{"key":"ref29","first-page":"1","article-title":"Minimization and reliability analyses of attack graphs","author":"Jha","year":"2002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2013.18"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615507"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2013.6825274"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423682"},{"key":"ref39","first-page":"1","article-title":"A complete guide to the common vulnerability scoring system version 2.0","volume":"1","author":"Mell","year":"2007","journal-title":"FIRST-Forum of Incident Response and Security Teams"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.7435"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NetCoM.2009.83"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2382416.2382427"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478585"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2014.113"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.44"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919104"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.20001"},{"key":"ref48","first-page":"1","article-title":"Scenario graphs applied to security (summary paper)","volume-title":"Proc. Workshop Verification Infinite State Syst. Appl. Secur.","author":"Wing"},{"key":"ref49","first-page":"1","article-title":"Scenario graphs and attack graphs","volume":"1","author":"Sheyner","year":"2004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_7"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012373566-9.50011-2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2014.18"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.006"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2021.117393"},{"key":"ref56","first-page":"1","article-title":"Common vulnerability scoring system v3.0: Specification document","year":"2015"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10400751\/10061343.pdf?arnumber=10061343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:26:17Z","timestamp":1705541177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10061343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":57,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3253121","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}