{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:18:22Z","timestamp":1725477502572},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540690832"},{"type":"electronic","value":"9783540690849"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11962977_4","type":"book-chapter","created":{"date-parts":[[2007,1,19]],"date-time":"2007-01-19T05:55:24Z","timestamp":1169186124000},"page":"42-54","source":"Crossref","is-referenced-by-count":7,"title":["Assessing the Risk of an Information Infrastructure Through Security Dependencies"],"prefix":"10.1007","author":[{"given":"F.","family":"Baiardi","sequence":"first","affiliation":[]},{"given":"S.","family":"Suin","sequence":"additional","affiliation":[]},{"given":"C.","family":"Telmon","sequence":"additional","affiliation":[]},{"given":"M.","family":"Pioli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Managing Information Security Risks","author":"C. Alberts","year":"2002","unstructured":"Alberts, C., Dorofee, A.: Managing Information Security Risks. Addison-Wesley, Reading (2002)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Ammann, P., et al.: Scalable, Graph-based Network Vulnerability Analysis. In: 9th ACM Conf. on Computer and Communications security, Washington, DC, USA (November 2002)","DOI":"10.1145\/586110.586140"},{"key":"4_CR3","volume-title":"Security Engineering A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2001)"},{"key":"4_CR4","unstructured":"Baiardi, F., et al.: Constrained Automata: a Formal Tool for ICT Risk Assessment. In: NATO Advanced Research Workshop on Information Security and Assurance, Marocco (June 2005)"},{"key":"4_CR5","first-page":"1593","volume-title":"Proc. MEDINFO 1992","author":"B. Barber","year":"1992","unstructured":"Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM. In: Proc. MEDINFO 1992, vol.\u00a01589, p. 1593. North Holland, Amsterdam (1992)"},{"key":"4_CR6","unstructured":"CORAS: A platform for risk analysis of security critical systems. IST-2000-25031 (2000)"},{"key":"4_CR7","unstructured":"Dawkins, J., Campbell, C., Hale, J.: Modeling Network Attacks: Extending the Attack Tree Paradigm. Statistical and Machine Learning in Computer Intrusion Detection (June 2002)"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L. Gordon","year":"2002","unstructured":"Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. on Information and System Security\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Trans. on Information and System Security"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Lipmann, R.P., Ingols, K.W.: An Annotated Review of Past Paper on Attack Graphs, Project Report, Lincoln Lab. MIT (March 2005)","DOI":"10.21236\/ADA431826"},{"key":"4_CR10","unstructured":"IEC 1025: 1990 Fault tree analysis (FTA)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two Formal Analysis of Attack Graphs. In: 15th IEEE Computer Security Foundations Workshop, June 2002, p. 49 (2002)","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Moore, P., Ellison, R.J., Linger, R.C.: Attack modeling for information security and survivability, CMU\/SEI- 2001-TN001","DOI":"10.21236\/ADA387544"},{"key":"4_CR13","unstructured":"National Infrastructure Advisory Council, The Common Vulnerability Scoring System, Final Report and Recomandations (October 2004)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Ning, P., et al.: Constructing attack scenarios through correlation of intrusion alerts. In: 9th ACM Conf. on Computer and Communications Security, Washington, DC, USA (November 2002)","DOI":"10.1145\/586110.586144"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Phillips, C., Painton Swiler, L.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms, September 1998, pp. 71\u201379 (1998)","DOI":"10.1145\/310889.310919"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Ritchey, R., et al.: Representing TCP\/IP Connectivity For Topological Analysis of Network Security. In: 18th Annual Computer Security Applications Conf., December 2002, p. 25 (2002)","DOI":"10.1109\/CSAC.2002.1176275"},{"key":"4_CR17","volume-title":"Artificial Intelligence: a Modern Approach","author":"S. Russell","year":"2003","unstructured":"Russell, S., Norving, P.: Artificial Intelligence: a Modern Approach. Prentice-Hall, Englewood Cliffs (2003)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Sheyner, O., et al.: Automated Generation and Analysis of Attack Graphs. In: Proc. of the 2002 IEEE Symposium on Security and Privacy, May 12-15 (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"4_CR19","unstructured":"Sheyner, O.M.: Scenario Graphs and Attack Graphs, CMU-CS-04-122 (2004)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-Attack Graph Generation Tool. In: Proc. of the DARPA Information Survivability Conf. (June 2001)","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Swarup, V., Jajodia, S., Pamula, J.: Rule-Based Topological Vulnerability Analysis. In: 3rd Int. Wor. on Math. Methods, Models and Arc. for Network Security, S. Petersburg (September 2005)","DOI":"10.1007\/11560326_3"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/11962977_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:33Z","timestamp":1619508153000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/11962977_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540690832","9783540690849"],"references-count":21,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/11962977_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}