{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:56:22Z","timestamp":1725983782280},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319957289"},{"type":"electronic","value":"9783319957296"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95729-6_3","type":"book-chapter","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T13:19:16Z","timestamp":1531142356000},"page":"38-47","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes"],"prefix":"10.1007","author":[{"given":"Edwin","family":"Bourget","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Dubus","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Foley","sequence":"additional","affiliation":[]},{"given":"Youssef","family":"Laarouchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"key":"3_CR1","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Report, DTIC Document (1981)"},{"key":"3_CR2","first-page":"21","volume":"24","author":"S Bruce","year":"1999","unstructured":"Bruce, S.: Attack trees. Dr. Dobb\u2019s J. 24, 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, 1456368, pp. 23\u201330. ACM (2008)","DOI":"10.1145\/1456362.1456368"},{"key":"3_CR4","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection (1994)"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0951-8320(03)00143-1","volume":"82","author":"M Bouissou","year":"2003","unstructured":"Bouissou, M., Bon, J.L.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Mater. Reliab. Eng. Syst. Saf. 82(2), 149\u2013163 (2003)","journal-title":"Mater. Reliab. Eng. Syst. Saf."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic driven Markov processes (BDMP). In: Proceedings of the 2010 European Dependable Computing Conference, vol. 1827752, pp. 199\u2013208. IEEE Computer Society (2010)","DOI":"10.1109\/EDCC.2010.32"},{"issue":"13","key":"3_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S1474-6670(17)51368-3","volume":"24","author":"M. Bouissou","year":"1991","unstructured":"Bouissou, M., Villatte, N., Bouhadana, H., Bannelier, M.: Knowledge modelling and reliability processing: presentation of the figaro language and associated tools. Report, Electricite de France (EDF), December 1991","journal-title":"IFAC Proceedings Volumes"},{"key":"3_CR8","unstructured":"Pernestl, A.: A Bayesian approach to fault isolation with application to diesel engine diagnosis. Thesis (2007)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"F Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: LAMBDA: a language to model a database for detection of attacks. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 197\u2013216. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-39945-3_13"},{"key":"3_CR10","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 202\u2013215 (2002)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S., Martin, A.: Success likelihood of ongoing attacks for intrusion detection and response systems. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 83\u201391 (2009)","DOI":"10.1109\/CSE.2009.233"},{"key":"3_CR12","unstructured":"Schroeder, B., Gibson, G.A.: Disk failures in the real world: what does an MTTF of 1,000,000 hours mean to you? In: Proceedings of the 5th USENIX Conference on File and Storage Technologies, 1267904. USENIX Association 1 (2007)"},{"key":"3_CR13","unstructured":"Cuppens, F., Autrel, F., Mi\u00e8ge, A., Benferhat, S.: Recognizing malicious intention in an intrusion detection process. In: HIS, pp. 806\u2013817 (2002)"},{"key":"3_CR14","unstructured":"Rogers, J., M. Watkins, C.: Overview of the Taum Sauk Pumped Storage Power Plant Upper Reservoir Failure, Reynolds County, MO (2008)"},{"key":"3_CR15","unstructured":"Team, F.T.S.I.: Report of findings on the overtopping and embankment breach of the upper dam - Taum Sauk pumped storage project, Report, 28 Apr 2006"},{"key":"3_CR16","unstructured":"Before the public service commission state of Missouri - staff\u2019s initial incident report. Report, October 2007"},{"key":"3_CR17","first-page":"179","volume-title":"Information Systems Security","author":"M Dacier","year":"1996","unstructured":"Dacier, M., Deswarte, Y., Ka\u00e2niche, M.: Quantitative assessment of operational security: models and tools. In: Katsikas, S.K., Gritzalis, D. (eds.) Information Systems Security, pp. 179\u2013186. Chapman & Hall, London (1996)"},{"issue":"4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.engappai.2010.06.002","volume":"25","author":"P Weber","year":"2012","unstructured":"Weber, P., Medina-Oliva, G., Simon, C., Iung, B.: Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Eng. Appl. Artif. Intell. 25(4), 671\u2013682 (2012)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Boudali, H., Dugan, J.B.: A new Bayesian network approach to solve dynamic fault trees (2005)","DOI":"10.1109\/RAMS.2005.1408404"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95729-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:03:00Z","timestamp":1657324980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95729-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319957289","9783319957296"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95729-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergamo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec18.unibg.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}