{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:34:59Z","timestamp":1758267299551,"version":"3.44.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isie.2019.8781238","type":"proceedings-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T19:55:47Z","timestamp":1564689347000},"page":"1644-1649","source":"Crossref","is-referenced-by-count":5,"title":["Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks"],"prefix":"10.1109","author":[{"given":"Shabnam","family":"Pasandideh","sequence":"first","affiliation":[{"name":"Universidade Nova de Lisboa &#x2013; FCT &#x2013; DEEC &#x0026; UNINOVA &#x2013; CTS, Portugal"}]},{"given":"Luis","family":"Gomes","sequence":"additional","affiliation":[{"name":"Universidade Nova de Lisboa &#x2013; FCT &#x2013; DEEC &#x0026; UNINOVA &#x2013; CTS, Portugal"}]},{"given":"Pedro","family":"Mal\u00f3","sequence":"additional","affiliation":[{"name":"Universidade Nova de Lisboa &#x2013; FCT &#x2013; DEEC, Portugal"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.142"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170813"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref10","first-page":"60","article-title":"Attack Trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J Softw Tools"},{"article-title":"LNCS 3935 - Foundations of Attack Trees","year":"2006","author":"mauw","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17197-0_17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852698"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2012040101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40196-1_15"},{"article-title":"A FRAMEWORK FOR ANALYZING AND MITIGATING THE VULNERABILITIES OF COMPLEX SYSTEMS VIA ATTACK AND PROTECTION TREES","year":"2007","author":"edge","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.024"},{"key":"ref19","article-title":"A survey of fault and attack tree modeling and analysis for cyber risk management","author":"vidhyashree","year":"2017","journal-title":"2017 IEEE Int Symp Technol Homel Secur HST 2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185564"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2017.05.015"},{"key":"ref27","first-page":"1","article-title":"Stochastic Petri nets: An elementary introduction","author":"marsan","year":"1988","journal-title":"European Workshop on Applications and Theory in Petri Net European Workshop on Applications and Theory in Petri Net"},{"key":"ref3","first-page":"1","article-title":"Industry 4.0: state of the art and future trends","volume":"7543","author":"da xu","year":"2018","journal-title":"Int J Prod Res"},{"year":"0","key":"ref6","article-title":"CISCO"},{"article-title":"A Survey on Anomaly Based Host Intrusion Detection System","year":"2018","author":"nehemia","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref8","first-page":"69","article-title":"Cyber-Attack Modeling Analysis Techniques?: An Overview","author":"al-mohannadi","year":"2016","journal-title":"2016 IEEE 4th Int Conf Futur Internet Things Cloud Work"},{"key":"ref7","first-page":"390","article-title":"A Survey on Various Cyber Attacks and Their Classification","volume":"15","author":"uma","year":"2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.09.001"},{"article-title":"Intoruction to Embedded Systems A Cyber-Physical System approach","year":"2017","author":"lee","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"Using attack and protection trees to analyze threats and defenses to homeland security","author":"edge","year":"2007","journal-title":"Proceedings - IEEE Military Communications Conference MILCOM"},{"key":"ref22","first-page":"93","article-title":"A Class of Generalized Stochastic Petri Nets for the Performance Evaluation of Multiprocessor Systems","volume":"2","author":"marsan","year":"1984"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref24","first-page":"15","article-title":"Attack net penetration testing","author":"mcdermott","year":"2001","journal-title":"Proceedings of the 2000 New Security Paradigms Workshop"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160000"},{"article-title":"Time Petri Nets","year":"2013","author":"popova-zeugmann","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/508832.508843"}],"event":{"name":"2019 IEEE 28th International Symposium on Industrial Electronics (ISIE)","start":{"date-parts":[[2019,6,12]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2019,6,14]]}},"container-title":["2019 IEEE 28th International Symposium on Industrial Electronics (ISIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8767359\/8781085\/08781238.pdf?arnumber=8781238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:19:22Z","timestamp":1755800362000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8781238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isie.2019.8781238","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}