{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:27:18Z","timestamp":1759991238082,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HUST","award":["Assessing security risks of Web systems"],"award-info":[{"award-number":["Assessing security risks of Web systems"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568591","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"165-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessing web security risks using dynamic Bayesian network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2522-4241","authenticated-orcid":false,"given":"Thi-Huong-Giang","family":"Vu","sequence":"first","affiliation":[{"name":"Hanoi University of Science and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4571-8342","authenticated-orcid":false,"given":"Trung-Hieu","family":"Hoang","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2082-0175","authenticated-orcid":false,"given":"Manh-Tuan","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"volume-title":"Network Security Metrics","author":"Frigault Marcel","key":"e_1_3_2_1_1_1","unstructured":"Marcel Frigault , Lingyu Wang , Sushil Jajodia , and Anoop Singhal . 2017. Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks . In Network Security Metrics . Springer Charm , The Capital Region of Denmark, 1\u201323. Marcel Frigault, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. 2017. Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks. In Network Security Metrics. Springer Charm, The Capital Region of Denmark, 1\u201323."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.54654\/isj.v14i2.209"},{"key":"e_1_3_2_1_3_1","volume-title":"L\u00facio Camara\u00a0e Silva, and Ana\u00a0Paula Cabral Seixas\u00a0Costa","author":"Henriques\u00a0de Gusm\u00e3o Ana\u00a0Paula","year":"2018","unstructured":"Ana\u00a0Paula Henriques\u00a0de Gusm\u00e3o , Maisa Mendon\u00e7a\u00a0Silva , Thiago Poleto , L\u00facio Camara\u00a0e Silva, and Ana\u00a0Paula Cabral Seixas\u00a0Costa . 2018 . Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management 43 (Dec. 2018), 248\u2013260. Ana\u00a0Paula Henriques\u00a0de Gusm\u00e3o, Maisa Mendon\u00e7a\u00a0Silva, Thiago Poleto, L\u00facio Camara\u00a0e Silva, and Ana\u00a0Paula Cabral Seixas\u00a0Costa. 2018. Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management 43 (Dec. 2018), 248\u2013260."},{"volume-title":"Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps","author":"Hsu Tony","key":"e_1_3_2_1_5_1","unstructured":"Tony Hsu . 2018. Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps . Packt Publishing , Birmingham, UK . OCLC: 1050953457. Tony Hsu. 2018. Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps. Packt Publishing, Birmingham, UK. OCLC: 1050953457."},{"volume-title":"Standard","author":"Requirements ISO","key":"e_1_3_2_1_6_1","unstructured":"ISO 27001:2013(E) 2013. ISO\/IEC 27001:2013 Information technology \u2014 Security techniques - Information security management systems - Requirements . Standard . International Organization for Standardization , Geneva, CH . ISO 27001:2013(E) 2013. ISO\/IEC 27001:2013 Information technology \u2014 Security techniques - Information security management systems - Requirements. Standard. International Organization for Standardization, Geneva, CH."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09558-5"},{"volume-title":"Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security(SPIE Proceedings, Vol.\u00a05812), Belur\u00a0V","author":"Liu Yu","key":"e_1_3_2_1_9_1","unstructured":"Yu Liu and Hong Man . 2005. Network vulnerability assessment using Bayesian networks . In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security(SPIE Proceedings, Vol.\u00a05812), Belur\u00a0V . Dasarathy (Ed.). SPIE , Orlando, Florida, USA , 61\u201371. Yu Liu and Hong Man. 2005. Network vulnerability assessment using Bayesian networks. In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security(SPIE Proceedings, Vol.\u00a05812), Belur\u00a0V. Dasarathy (Ed.). SPIE, Orlando, Florida, USA, 61\u201371."},{"key":"e_1_3_2_1_10_1","volume-title":"2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE","author":"Xie Peng","year":"2010","unstructured":"Peng Xie , Jason\u00a0 H Li , Xinming Ou , Peng Liu , and Renato Levy . 2010 . Using Bayesian networks for cyber security analysis . In 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE , Chicago, IL, USA, 211\u2013220. Peng Xie, Jason\u00a0H Li, Xinming Ou, Peng Liu, and Renato Levy. 2010. Using Bayesian networks for cyber security analysis. In 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, Chicago, IL, USA, 211\u2013220."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2016.50"},{"volume-title":"Communication, Control, and Management","author":"Wu Xiaoping","key":"e_1_3_2_1_13_1","unstructured":"Xiaoping Wu , Yu Fu , and Jiasheng Wang . 2009. Information systems security risk assessment on improved fuzzy AHP. In 2009 ISECS International Colloquium on Computing , Communication, Control, and Management . IEEE, Sanya , China , 365\u2013369. Xiaoping Wu, Yu Fu, and Jiasheng Wang. 2009. Information systems security risk assessment on improved fuzzy AHP. In 2009 ISECS International Colloquium on Computing, Communication, Control, and Management. IEEE, Sanya, China, 365\u2013369."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297330"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","acronym":"SoICT 2022","location":"Hanoi Vietnam"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:39Z","timestamp":1750186839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":12,"alternative-id":["10.1145\/3568562.3568591","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568591","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}