{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:31Z","timestamp":1750308031861,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314257.1314270","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"40-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Defining categories to select representative attack test-cases"],"prefix":"10.1145","author":[{"given":"Mohammed S.","family":"GADELRAB","sequence":"first","affiliation":[{"name":"LAAS-CNRS, Toulouse, France"}]},{"given":"Anas Abou","family":"El Kalam","sequence":"additional","affiliation":[{"name":"INP\/ENSEEIHT, Toulouse, France"}]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[{"name":"LAAS-CNRS, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Test case design using classification trees and the classification-tree Editor","author":"Grochtmann M.","year":"1995","unstructured":"M. Grochtmann , J. Wegener , K. Grimm , Test case design using classification trees and the classification-tree Editor CTE, Proc . of the 8th Int. SW Quality Week , pp. 1 -- 11 , 1995 . M. Grochtmann, J. Wegener, K. Grimm, Test case design using classification trees and the classification-tree Editor CTE, Proc. of the 8th Int. SW Quality Week, pp. 1--11, 1995."},{"key":"e_1_3_2_1_4_1","first-page":"154","volume-title":"How to Systematically Classify Computer Security Intrusions","author":"Lindqvist U.","year":"1997","unstructured":"U. Lindqvist and E. Jonsson , How to Systematically Classify Computer Security Intrusions , IEEE Security &amp; Privacy , pp 154 -- 163 , 1997 . U. Lindqvist and E. Jonsson, How to Systematically Classify Computer Security Intrusions, IEEE Security &amp; Privacy, pp 154--163, 1997."},{"key":"e_1_3_2_1_5_1","first-page":"396","volume-title":"12th National Computer Security Conference","author":"Neumann P. G.","year":"1989","unstructured":"P. G. Neumann and D. B. Parker , A Summary of Computer Misuse Techniques , presented at 12th National Computer Security Conference , Baltimore, MD , pp. 396 -- 407 , 1989 . P. G. Neumann and D. B. Parker, A Summary of Computer Misuse Techniques, presented at 12th National Computer Security Conference, Baltimore, MD, pp. 396--407, 1989."},{"key":"e_1_3_2_1_7_1","volume-title":"Master Thesis","author":"Weber D. J.","year":"1998","unstructured":"D. J. Weber , A Taxonomy of Computer Intrusions , Master Thesis , Massachusetts Institute of Technology , June 1998 . D. J. Weber, A Taxonomy of Computer Intrusions, Master Thesis, Massachusetts Institute of Technology, June 1998."},{"key":"e_1_3_2_1_8_1","volume-title":"Master's Thesis","author":"Kendall K.","year":"1999","unstructured":"K. Kendall , A database of computer attacks for the evaluation of intrusion detection systems , Master's Thesis . Massachusetts Institute of Technology , MA , June 1999 . K. Kendall, A database of computer attacks for the evaluation of intrusion detection systems, Master's Thesis. Massachusetts Institute of Technology, MA, June 1999."},{"key":"e_1_3_2_1_10_1","first-page":"102","volume-title":"International Conference on Dependable Systems &amp; Networks","author":"Killourhy K. S.","year":"2004","unstructured":"K. S. Killourhy A Defense-Centric Taxonomy Based on Attack Manifestations , In International Conference on Dependable Systems &amp; Networks , pp. 102 -- 111 , Italy , 2004 . K. S. Killourhy et al, A Defense-Centric Taxonomy Based on Attack Manifestations, In International Conference on Dependable Systems &amp; Networks, pp. 102--111, Italy, 2004."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Quality of protection"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314257.1314270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314257.1314270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314257.1314270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":7,"alternative-id":["10.1145\/1314257.1314270","10.1145\/1314257"],"URL":"https:\/\/doi.org\/10.1145\/1314257.1314270","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}