{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:06:09Z","timestamp":1773155169211,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339270","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs"],"prefix":"10.1145","author":[{"given":"Jukka","family":"Soikkeli","sequence":"first","affiliation":[{"name":"Imperial College London, United Kingdom"}]},{"given":"Luis","family":"Mu\u00f1oz-Gonz\u00e1lez","sequence":"additional","affiliation":[{"name":"Imperial College London, United Kingdom"}]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[{"name":"Imperial College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"A Graphical Model to Assess the Impact of Multi-Step Attacks","volume":"15","author":"Albanese M.","year":"2017","journal-title":"Journal of Defense Modeling and Simulation: Applications, Methodology, Technology"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041255"},{"key":"e_1_3_2_1_3_1","volume-title":"A framework to quantitatively assess and enhance the seismic resilience of communities. Earthquake spectra 19, 4","author":"Bruneau M.","year":"2003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809826.2809837"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2773366"},{"key":"e_1_3_2_1_6_1","volume-title":"Int. Conf. Risks and Security of Internet and Systems CRiSIS 2015 9572","author":"Doynikova E.","year":"2015"},{"key":"e_1_3_2_1_7_1","unstructured":"FIRST. 2018. Common Vulnerability Scoring System. (2018). https:\/\/www.first.org\/cvss Accessed: 2018-09-14.  FIRST. 2018. Common Vulnerability Scoring System. (2018). https:\/\/www.first.org\/cvss Accessed: 2018-09-14."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep19540"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Information security expenditures and real options: A wait-and-see approach","author":"Gordon L.A.","year":"2003","journal-title":"Computer Security Journal"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.08.006"},{"key":"e_1_3_2_1_12_1","unstructured":"I. Kotenko and E. Doynikova. 2014. Evaluation of computer network security based on attack graphs and security event processing. J. Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 5 3 (2014) 14--29.  I. Kotenko and E. Doynikova. 2014. Evaluation of computer network security based on attack graphs and security event processing. J. Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 5 3 (2014) 14--29."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2015.34"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. 24th Euromicro Int. Conf. on Parallel, Distrib., and Network-Based Processing, PDP 2016. IEEE, 558--565","author":"Kotenko I."},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks","volume":"20","author":"Nespoli P.","year":"2017","journal-title":"IEEE Commun. Surveys Tut."},{"key":"e_1_3_2_1_16_1","volume-title":"Cyber Security Resource Allocation: A Markov Decision Process Approach. In High Assurance Systems Engineering (HASE)","author":"Njilla L.L.","year":"2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2615622"},{"key":"e_1_3_2_1_18_1","volume-title":"Variations in Graph Energy: A Measure for Network Resilience. In Resilient Networks Design and Modeling (RNDM), 2017 9th Int. Workshop on. IEEE, 1--7.","author":"Shatto T.A."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9573-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2746754"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":22,"alternative-id":["10.1145\/3339252.3339270","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339270","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}