{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:12Z","timestamp":1763468112537},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412636","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T14:44:59Z","timestamp":1359125099000},"page":"121-126","source":"Crossref","is-referenced-by-count":12,"title":["Mapping evidence graphs to attack graphs"],"prefix":"10.1109","author":[{"given":"Changwei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Overview of Disk Imaging Tool in Computer Forensics","year":"2001","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"23","article-title":"A Classification of SQL-Injection Attacks and Countermeasures","author":"halfond","year":"0","journal-title":"Proceedings of the International Symposium on Secure Software Engineering (ISSSE 2006) Mar 2006"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.21"},{"journal-title":"5th International Workshop on Visualization for Cyber Security (VizSEC 2008) Cambridge MA U S A September 2008","year":"0","author":"homer","key":"24"},{"journal-title":"MulVAL V1 1","year":"2012","key":"15"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.013"},{"journal-title":"National Vulnerability Database","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.58"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213257"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"journal-title":"File System Forensic Analysis","year":"2005","author":"carrier","key":"20"},{"key":"2","article-title":"An Event-Based Digital Forensic Investigation Framework","author":"carrier","year":"0","journal-title":"Proceedings of Digital Forensic Research Workshop 2004"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.14"},{"key":"10","article-title":"An attack graph-based probabilistic security metric","author":"wang","year":"2008","journal-title":"Proceedings of the 22nd Annual IFIP WG 11 3 Working Conference on Data and Applications Security (DBSEC'08)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"journal-title":"Graphviz - Graph Visualization Software","year":"0","key":"6"},{"journal-title":"CVSS - A Complete Guide to the Common Vulnerability Scoring System","year":"0","key":"5"},{"key":"4","article-title":"Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs","author":"singhal","year":"2011","journal-title":"NIST interagency report"},{"journal-title":"National Vulnerability Database","year":"0","key":"9"},{"journal-title":"TightVNC Software","year":"0","key":"8"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412636.pdf?arnumber=6412636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:11:45Z","timestamp":1490127105000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412636","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}