{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:05Z","timestamp":1767339845348,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Centre for Cyber Defence and Information Security (CDIS)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664508","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Metalanguage for Dynamic Attack Graphs and Lazy Generation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6762-3662","authenticated-orcid":false,"given":"Viktor","family":"Engstr\u00f6m","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7168-599X","authenticated-orcid":false,"given":"Giuseppe","family":"Nebbione","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3922-9606","authenticated-orcid":false,"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411264"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"e_1_3_2_1_3_1","volume-title":"Netspa: A network security planning architecture. Ph.\u00a0D. Dissertation","author":"Artz Michael\u00a0Lyle","year":"2002","unstructured":"Michael\u00a0Lyle Artz. 2002. Netspa: A network security planning architecture. Ph.\u00a0D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198753919.001.0001"},{"key":"e_1_3_2_1_5_1","volume-title":"Netherlands : 1999) 228","author":"Boudermine Antoine","year":"2023","unstructured":"Antoine Boudermine, Rida Khatoun, and Jean-Henri Choyer. 2023. Dynamic logic-based attack graph for risk assessment in complex computer systems. Computer networks (Amsterdam, Netherlands : 1999) 228 (2023), 109730\u2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570903"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.028"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102938"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(97)00050-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4225\/75\/57b559a3cd8da"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.09.001"},{"key":"e_1_3_2_1_13_1","volume-title":"An Ontology-Based Dynamic Attack Graph Generation Approach for the Internet of Vehicles. Frontiers in energy research 10","author":"Hou Shuning","year":"2022","unstructured":"Shuning Hou, Xiuzhen Chen, Jin Ma, Zhihong Zhou, and Haiyang Yu. 2022. An Ontology-Based Dynamic Attack Graph Generation Approach for the Internet of Vehicles. Frontiers in energy research 10 (2022), 12\u00a0pages."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229288"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232799"},{"key":"e_1_3_2_1_16_1","volume-title":"Development and Validation of Corelang: A Threat Modeling Language for the ICT Domain. Available at SSRN 4727006","author":"Katsikeas Sotirios","year":"2024","unstructured":"Sotirios Katsikeas, Andrei Buhaiu, Mathias Ekstedt, Zeeshan Afzal, Simon Hacks, and Preetam Mukherjee. 2024. Development and Validation of Corelang: A Threat Modeling Language for the ICT Domain. Available at SSRN 4727006 (2024). [Accessed on 08-03-2024]."},{"volume-title":"Graphical Models for Security","author":"Katsikeas Sotirios","key":"e_1_3_2_1_17_1","unstructured":"Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerstr\u00f6m, Joar Jacobsson, Max W\u00e4llstedt, and Per Eliasson. 2020. An Attack Simulation Language for the IT Domain. In Graphical Models for Security. Springer International Publishing, Cham, 67\u201386."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102705"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"e_1_3_2_1_20_1","volume-title":"MDA Explained: The Model Driven Architecture: Practice and Promise","author":"Kleppe G","unstructured":"Anneke\u00a0G Kleppe, Jos\u00a0B Warmer, and Wim Bast. 2003. MDA Explained: The Model Driven Architecture: Practice and Promise (1st edition ed.). Addison Wesley Professional, Place of publication not identified.","edition":"1"},{"key":"e_1_3_2_1_21_1","volume-title":"DAG-based attack and defense modeling: Don\u2019t miss the forest for the attack trees. Computer science review 13","author":"Kordy Barbara","year":"2014","unstructured":"Barbara Kordy, Ludovic Pi\u00e8tre-Cambac\u00e9d\u00e8s, and Patrick Schweitzer. 2014. DAG-based attack and defense modeling: Don\u2019t miss the forest for the attack trees. Computer science review 13 (2014), 1\u201338."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219"},{"volume-title":"Simulation modeling and analysis (5. ed","author":"Law M","key":"e_1_3_2_1_23_1","unstructured":"Averill\u00a0M Law. 2015. Simulation modeling and analysis (5. ed.. ed.). McGraw-Hill, Boston."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Richard\u00a0Paul Lippmann and Kyle\u00a0William Ingols. 2005. An annotated review of past papers on attack graphs. Technical Report.","DOI":"10.21236\/ADA431826"},{"key":"e_1_3_2_1_25_1","unstructured":"Pernelle Mensah. 2019. Generation and dynamic update of attack graphs in cloud providers infrastructures. Ph.\u00a0D. Dissertation. CentraleSup\u00e9lec."},{"volume-title":"Networks (2 ed.)","author":"Newman Mark","key":"e_1_3_2_1_26_1","unstructured":"Mark Newman. 2018. Networks (2 ed.). Oxford University Press, Oxford."},{"key":"e_1_3_2_1_27_1","volume-title":"MulVAL: A Logic-based Network Security Analyzer. In 14th USENIX Security Symposium (USENIX Security 05)","author":"Ou Xinming","year":"2005","unstructured":"Xinming Ou, Sudhakar Govindavajhala, and Andrew\u00a0W. Appel. 2005. MulVAL: A Logic-based Network Security Analyzer. In 14th USENIX Security Symposium (USENIX Security 05). USENIX Association, Baltimore, MD, 113\u2013128. https:\/\/www.usenix.org\/conference\/14th-usenix-security-symposium\/mulval-logic-based-network-security-analyzer"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100601"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3257721"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103284"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00898-7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.88"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103081"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:53:10Z","timestamp":1755881590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":35,"alternative-id":["10.1145\/3664476.3664508","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664508","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}