{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:26Z","timestamp":1750307306219,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T00:00:00Z","timestamp":1308528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,20]]},"DOI":"10.1145\/2000259.2000281","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"123-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling security attacks with statecharts"],"prefix":"10.1145","author":[{"given":"Omar","family":"El Ariss","sequence":"first","affiliation":[{"name":"North Dakota State University, Fargo, ND, USA"}]},{"given":"Dianxiang","family":"Xu","sequence":"additional","affiliation":[{"name":"Dakota State University, Madison, SD, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,20]]},"reference":[{"volume-title":"Wiley Encyclopedia of Computer Science and Engineering","author":"Xu D.","key":"e_1_3_2_1_1_1","unstructured":"Xu , D. 2009. Software Security . In Wiley Encyclopedia of Computer Science and Engineering . John Wiley & Sons . Xu, D. 2009. Software Security. In Wiley Encyclopedia of Computer Science and Engineering. John Wiley & Sons."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.119"},{"volume-title":"Writing Secure Code","author":"Howard M.","key":"e_1_3_2_1_3_1","unstructured":"Howard , M. and LeBlanc , D. 2003. Writing Secure Code . Microsoft Press . Howard, M. and LeBlanc, D. 2003. Writing Secure Code. Microsoft Press."},{"key":"e_1_3_2_1_4_1","unstructured":"Swiderski F. and Snyder W. 2004. Threat Modeling. Microsoft Press.   Swiderski F. and Snyder W. 2004. Threat Modeling. Microsoft Press."},{"key":"e_1_3_2_1_5_1","first-page":"21","article-title":"Attack Trees","volume":"24","author":"Schneier B.","year":"1999","unstructured":"Schneier , B. 1999 . Attack Trees . Dr. Dobb's Journal of Software Tools , 24 , 12, 21 -- 29 . Schneier, B. 1999. Attack Trees. Dr. Dobb's Journal of Software Tools, 24, 12, 21--29.","journal-title":"Dr. Dobb's Journal of Software Tools"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366183"},{"volume-title":"Information Security Essays","author":"Weissman C.","key":"e_1_3_2_1_8_1","unstructured":"Weissman , C. 1994. Penetration Testing . In Information Security Essays . IEEE Computer Society Press . Weissman, C. 1994. Penetration Testing. In Information Security Essays. IEEE Computer Society Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508843"},{"volume-title":"Proc. Of the 2001 IEEE Workshop on Information Assurance and Security.","author":"Tidwell T.","key":"e_1_3_2_1_10_1","unstructured":"Tidwell , T. , Larson , R. , Fitch , K. , and Hale , J . 2001. Modeling internet attacks . In Proc. Of the 2001 IEEE Workshop on Information Assurance and Security. Tidwell, T., Larson, R., Fitch, K., and Hale, J. 2001. Modeling internet attacks. In Proc. Of the 2001 IEEE Workshop on Information Assurance and Security."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200016"},{"volume-title":"NUCLEAR REGULATORY COMMISSION","year":"1981","key":"e_1_3_2_1_12_1","unstructured":"U.S. NUCLEAR REGULATORY COMMISSION . 1981 . Fault Tree Handbook. NUREG-0492, Washington . U.S. NUCLEAR REGULATORY COMMISSION. 1981. Fault Tree Handbook. NUREG-0492, Washington."},{"key":"e_1_3_2_1_13_1","volume-title":"Cautionary Tales: Stealth Coordinated Attack HOWTO","author":"Ruiu D.","year":"1999","unstructured":"Ruiu , D. 1999 . Cautionary Tales: Stealth Coordinated Attack HOWTO , http:\/\/althing.cs.dartmouth.edu\/secref\/local\/stealth-co-ordinated-attack.txt. Ruiu, D. 1999. Cautionary Tales: Stealth Coordinated Attack HOWTO, http:\/\/althing.cs.dartmouth.edu\/secref\/local\/stealth-co-ordinated-attack.txt."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2007.012246"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508990"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101965"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.40"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.114"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/235321.235322"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(92)90005-V"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646843.706613"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372148"},{"key":"e_1_3_2_1_25_1","unstructured":"Markoff J. (2008 Nov.) The New York Times. {Online}. http:\/\/www.nytimes.com\/2008\/11\/10\/technology\/internet\/10attacks.html?_r=2  Markoff J. (2008 Nov.) The New York Times. {Online}. http:\/\/www.nytimes.com\/2008\/11\/10\/technology\/internet\/10attacks.html?_r=2"},{"key":"e_1_3_2_1_26_1","unstructured":"Brenner B. (2010 Jan.) CSO. {Online}. http:\/\/www.csoonline.com\/article\/515614\/ddos-attacks-are-back-and-bigger-than-before-  Brenner B. (2010 Jan.) CSO. {Online}. http:\/\/www.csoonline.com\/article\/515614\/ddos-attacks-are-back-and-bigger-than-before-"},{"key":"e_1_3_2_1_27_1","unstructured":"Goodin D. (2008 Jan.) The Register. {Online}. http:\/\/www.theregister.co.uk\/2008\/01\/04\/changing_face_of_ddos\/  Goodin D. (2008 Jan.) The Register. {Online}. http:\/\/www.theregister.co.uk\/2008\/01\/04\/changing_face_of_ddos\/"}],"event":{"name":"Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Boulder Colorado USA","acronym":"Comparch '11"},"container-title":["Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000259.2000281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:00Z","timestamp":1750244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,20]]},"references-count":27,"alternative-id":["10.1145\/2000259.2000281","10.1145\/2000259"],"URL":"https:\/\/doi.org\/10.1145\/2000259.2000281","relation":{},"subject":[],"published":{"date-parts":[[2011,6,20]]},"assertion":[{"value":"2011-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}