{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:41Z","timestamp":1750306181188,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PANOPTESEC","award":["GA 610416"],"award-info":[{"award-number":["GA 610416"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970043","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Using a Deep Understanding of Network Activities for Network Vulnerability Assessment"],"prefix":"10.1145","author":[{"given":"Mona","family":"Lange","sequence":"first","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, Germany"}]},{"given":"Felix","family":"Kuhr","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Germany"}]},{"given":"Ralf","family":"M\u00f6ller","sequence":"additional","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/nvd.nist.gov\/","author":"National vulnerability database.","year":"2016","unstructured":"National vulnerability database. https:\/\/nvd.nist.gov\/ , 2016 . National vulnerability database. https:\/\/nvd.nist.gov\/, 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"NDN","author":"Afanasyev A.","year":"2012","unstructured":"Afanasyev , A. , Moiseenko , I. , and Zhang , L . ndnSIM: NDN simulator for NS-3. Technical report , NDN , 2012 . Afanasyev, A., Moiseenko, I., and Zhang, L. ndnSIM: NDN simulator for NS-3. Technical report, NDN, 2012."},{"key":"e_1_3_2_1_3_1","first-page":"97","volume-title":"ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V)","author":"Bahl P.","year":"2006","unstructured":"Bahl , P. , Barham , P. , Black , R. , Chandra , R. , Goldszmidt , M. , Isaacs , R. , Kandula , S., LI, L. , MacCormick , J. , Maltz , D. A. , Discovering dependencies for network management . In ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V) ( 2006 ), ACM, pp. 97 -- 102 . Bahl, P., Barham, P., Black, R., Chandra, R., Goldszmidt, M., Isaacs, R., Kandula, S., LI, L., MacCormick, J., Maltz, D. A., et al. Discovering dependencies for network management. In ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V) (2006), ACM, pp. 97--102."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1282427.1282383"},{"key":"e_1_3_2_1_5_1","first-page":"117","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI)","volume":"8","author":"Chen X.","year":"2008","unstructured":"Chen , X. , Zhang , M. , Mao , Z. M. , and Bahl , P . Automating network application dependency discovery: Experiences, limitations, and new solutions . In USENIX Symposium on Operating Systems Design and Implementation (OSDI) ( 2008 ), vol. 8 , pp. 117 -- 130 . Chen, X., Zhang, M., Mao, Z. M., and Bahl, P. Automating network application dependency discovery: Experiences, limitations, and new solutions. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2008), vol. 8, pp. 117--130."},{"unstructured":"Clapper J. R. Statement for the record worldwide threat assessment of the us intelligence community. http:\/\/www.dni.gov\/index.php\/newsroom\/testimonies\/209-congressional-testimonies-2015\/1174-statement-for-the-record-worldwide-threat-assessment-of-the-u-s-ic-before-the-sasc 2014.  Clapper J. R. Statement for the record worldwide threat assessment of the us intelligence community. http:\/\/www.dni.gov\/index.php\/newsroom\/testimonies\/209-congressional-testimonies-2015\/1174-statement-for-the-record-worldwide-threat-assessment-of-the-u-s-ic-before-the-sasc 2014.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"2015 cyber security intelligence index, july","author":"Corporation","year":"2015","unstructured":"Corporation , I. 2015 cyber security intelligence index, july 2015 . Corporation, I. 2015 cyber security intelligence index, july 2015."},{"unstructured":"de Barros Barreto A. Costa P. C. G. and Yano E. T. A semantic approach to evaluate the impact of cyber actions on the physical domain.  de Barros Barreto A. Costa P. C. G. and Yano E. T. A semantic approach to evaluate the impact of cyber actions on the physical domain.","key":"e_1_3_2_1_8_1"},{"unstructured":"Gohil B. G. Pathak R. K. and Patel A. A. Federated network security administration framework.  Gohil B. G. Pathak R. K. and Patel A. A. Federated network security administration framework.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/1856821.1856897"},{"key":"e_1_3_2_1_11_1","volume-title":"ISO\/IEC 13335-1: Management of information and communications technology security\u00e2\u0102\u0164Part 1: Concepts and models for information and communications technology security management","author":"Std I","year":"2004","unstructured":"ISO, I., and Std , I . ISO\/IEC 13335-1: Management of information and communications technology security\u00e2\u0102\u0164Part 1: Concepts and models for information and communications technology security management . 2004 . ISO, I., and Std, I. ISO\/IEC 13335-1: Management of information and communications technology security\u00e2\u0102\u0164Part 1: Concepts and models for information and communications technology security management. 2004."},{"key":"e_1_3_2_1_12_1","volume-title":"Iso 27005","author":"Std I","year":"2011","unstructured":"ISO, I., and Std , I . Iso 27005 : 2011 . Information technology--Security techniques--Information security risk management. ISO ( 2011). ISO, I., and Std, I. Iso 27005: 2011. Information technology--Security techniques--Information security risk management. ISO (2011)."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Information Fusion (FUSION)","author":"Jakobson G.","year":"2011","unstructured":"Jakobson , G. Mission cyber security situation assessment using impact dependency graphs . In Information Fusion (FUSION) ( 2011 ), pp. 1 -- 8 . Jakobson, G. Mission cyber security situation assessment using impact dependency graphs. In Information Fusion (FUSION) (2011), pp. 1--8."},{"unstructured":"Kolmogorov A. N. Foundations of the theory of probability.  Kolmogorov A. N. Foundations of the theory of probability.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Cyber Conflict (CyCon), 2013 5th International Conference on (June","author":"Kotenko I.","year":"2013","unstructured":"Kotenko , I. , and Chechulin , A . A cyber attack modeling and impact assessment framework . In Cyber Conflict (CyCon), 2013 5th International Conference on (June 2013 ), pp. 1 -- 24 . Kotenko, I., and Chechulin, A. A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (June 2013), pp. 1--24."},{"unstructured":"Martin B. Sullo C. and Kouns J. Osvdb: open source vulnerability database.  Martin B. Sullo C. and Kouns J. Osvdb: open source vulnerability database.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","volume-title":"Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/","author":"MITRE.","year":"2000","unstructured":"MITRE. Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/ , 2000 . MITRE. Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/, 2000."},{"key":"e_1_3_2_1_18_1","volume-title":"The 9th International Conference on Computational Intelligence in Security for Information Systems","author":"Mona Lange R. M.","year":"2016","unstructured":"Mona Lange , R. M. Time Series Data Mining for Network Service Dependency Analysis . In The 9th International Conference on Computational Intelligence in Security for Information Systems ( 2016 ), Springer International Publishing . Mona Lange, R. M. Time Series Data Mining for Network Service Dependency Analysis. In The 9th International Conference on Computational Intelligence in Security for Information Systems (2016), Springer International Publishing."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/s10708-011-9412-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/SYSCON.2011.5929055"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/INFCOM.2012.6195642"},{"unstructured":"Of the Hong Kong Special Administrative Region T. G. An overview of vulnerability scanners. http:\/\/www.infosec.gov.hk\/english\/technical\/files\/vulnerability.pdf 2008.  Of the Hong Kong Special Administrative Region T. G. An overview of vulnerability scanners. http:\/\/www.infosec.gov.hk\/english\/technical\/files\/vulnerability.pdf 2008.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX security","author":"Ou X.","year":"2005","unstructured":"Ou , X. , Govindavajhala , S. , and Appel , A. W . Mulval: A logic-based network security analyzer . In USENIX security ( 2005 ). Ou, X., Govindavajhala, S., and Appel, A. W. Mulval: A logic-based network security analyzer. In USENIX security (2005)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/978-3-540-88313-5_2"},{"unstructured":"TechTarget. Growing threats make security vulnerability management essential. http:\/\/searchsecurity.techtarget.com\/video\/Growing-threats-make-security-vulnerability-management-essential 2015.  TechTarget. Growing threats make security vulnerability management essential. http:\/\/searchsecurity.techtarget.com\/video\/Growing-threats-make-security-vulnerability-management-essential 2015.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Service name and transport protocol port number registry. The Internet Assigned Numbers Authority (IANA)","author":"Touch J.","year":"2013","unstructured":"Touch , J. , Kojo , M. , Lear , E. , Mankin , A. , Ono , K. , Stiemerling , M. , and Eggert , L . Service name and transport protocol port number registry. The Internet Assigned Numbers Authority (IANA) ( 2013 ). Touch, J., Kojo, M., Lear, E., Mankin, A., Ono, K., Stiemerling, M., and Eggert, L. Service name and transport protocol port number registry. The Internet Assigned Numbers Authority (IANA) (2013)."}],"event":{"acronym":"PrAISe '16","name":"PrAISe '16: International Workshop on AI for Privacy and Security","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":26,"alternative-id":["10.1145\/2970030.2970043","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970043","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}