{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:52Z","timestamp":1750307992074,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128822","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"14-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Attack graph generation and analysis"],"prefix":"10.1145","author":[{"given":"Jeannette M.","family":"Wing","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. Jha and J. Wing \"Survivability Analysis of Networked Systems \" Proceedings of the International Conference on Software Engineering Toronto Canada May 2001. Preliminary version available as CMU-CS-00-168 October 2000.   S. Jha and J. Wing \"Survivability Analysis of Networked Systems \" Proceedings of the International Conference on Software Engineering Toronto Canada May 2001. Preliminary version available as CMU-CS-00-168 October 2000."},{"key":"e_1_3_2_1_2_1","first-page":"49","volume-title":"Nova Scotia","author":"Jha S.","year":"2002"},{"volume-title":"Computer Science Department","year":"2004","author":"Sheyner O.","key":"e_1_3_2_1_3_1"},{"volume-title":"CA","year":"2002","author":"Sheyner O.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"344","author":"Sheyner O.","year":"2004","journal-title":"\"Tools for Generating and Analyzing Attack Graphs,\" Proceedings of Workshop on Formal Methods for Components and Objects"},{"volume-title":"Proceedings of Workshop on Verification of Infinite State Systems with Applications to Security","year":"2005","author":"Wing J.M.","key":"e_1_3_2_1_6_1"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":6,"alternative-id":["10.1145\/1128817.1128822","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128822","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}