{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:17Z","timestamp":1725751637712},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_16","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"227-241","source":"Crossref","is-referenced-by-count":6,"title":["Creating Integrated Evidence Graphs for Network Forensics"],"prefix":"10.1007","author":[{"given":"Changwei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/586110.586140","volume-title":"Proceedings of the Ninth ACM Conference on Computer and Communications Security","author":"P. Ammann","year":"2002","unstructured":"P.\u00a0Ammann, D.\u00a0Wijesekera and S.\u00a0Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp. 217\u2013224, 2002."},{"key":"16_CR2","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2009","unstructured":"T.\u00a0Cormen, C.\u00a0Leiserson, R.\u00a0Rivest and C.\u00a0Stein, Introduction to Algorithms, MIT Press, Cambridge, Massachusetts, 2009."},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-85933-8_7","volume-title":"Proceedings of the Fifth International Workshop on Visualization for Cyber Security","author":"J. Homer","year":"2008","unstructured":"J.\u00a0Homer, A.\u00a0Varikuti, X.\u00a0Ou and M.\u00a0McQueen, Improving attack graph visualization through data reduction and attack grouping, Proceedings of the Fifth International Workshop on Visualization for Cyber Security, pp. 68\u201379, 2008."},{"key":"16_CR4","first-page":"121","volume-title":"Proceedings of the Twenty-Second Annual Computer Security Applications Conference","author":"K. Ingols","year":"2006","unstructured":"K.\u00a0Ingols, R.\u00a0Lippmann and K.\u00a0Piwowarski, Practical attack graph generation for network defense, Proceedings of the Twenty-Second Annual Computer Security Applications Conference, pp. 121\u2013130, 2006."},{"key":"16_CR5","first-page":"49","volume-title":"Proceedings of the Fifteenth Computer Security Foundations Workshop","author":"S. Jha","year":"2002","unstructured":"S.\u00a0Jha, O.\u00a0Sheyner and J.\u00a0Wing, Two formal analyses of attack graphs, Proceedings of the Fifteenth Computer Security Foundations Workshop, p. 49, 2002."},{"key":"16_CR6","first-page":"121","volume-title":"Proceedings of the IEEE International Workshop on Information Forensics and Security","author":"C. Liu","year":"2012","unstructured":"C.\u00a0Liu, A.\u00a0Singhal and D.\u00a0Wijesekera, Mapping evidence graphs to attack graphs, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 121\u2013126, 2012."},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11856214_7","volume-title":"Proceedings of the Ninth International Conference on Recent Advances in Intrusion Detection","author":"V. Mehta","year":"2006","unstructured":"V.\u00a0Mehta, C.\u00a0Bartzis, H.\u00a0Zhu, E.\u00a0Clarke and J.\u00a0Wing, Ranking attack graphs, Proceedings of the Ninth International Conference on Recent Advances in Intrusion Detection, pp. 127\u2013144, 2006."},{"key":"16_CR8","unstructured":"National Institute of Standards and Technology, National Vulnerability Database, Version 2.2, Gaithersburg, Maryland (\n \n nvd.nist.gov\n \n \n )."},{"key":"16_CR9","first-page":"336","volume-title":"Proceedings of the Thirteenth ACM Conference on Computer and Communications Security","author":"X. Ou","year":"2006","unstructured":"X. Ou, W. Boyer and M. McQueen, A scalable approach to attack graph generation, Proceedings of the Thirteenth ACM Conference on Computer and Communications Security, pp. 336\u2013345, 2006."},{"key":"16_CR10","first-page":"273","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"O. Sheyner","year":"2002","unstructured":"O.\u00a0Sheyner, J.\u00a0Haines, S.\u00a0Jha, R.\u00a0Lippmann and J.\u00a0Wing, Automated generation and analysis of attack graphs, Proceedings of the IEEE Symposium on Security and Privacy, pp. 273\u2013284, 2002."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"A.\u00a0Singhal and X.\u00a0Ou, Security Risk Analysis of Enterprise Networks using Probabilistic Attack Graphs, NIST Interagency Report 7788, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.","DOI":"10.6028\/NIST.IR.7788"},{"key":"16_CR12","first-page":"283","volume-title":"Proceedings of the Twenty-Second Annual IFIP WG 11.3 Conference on Data and Applications Security","author":"L. Wang","year":"2008","unstructured":"L.\u00a0Wang, T.\u00a0Islam, T.\u00a0Long, A.\u00a0Singhal and S.\u00a0Jajodia, An attack graph based probabilistic security metric, Proceedings of the Twenty-Second Annual IFIP WG 11.3 Conference on Data and Applications Security, pp. 283\u2013296, 2008."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"W.\u00a0Wang and T.\u00a0Daniels, A graph based approach toward network forensic analysis, ACM Transactions on Information and Systems Security, vol. 12(1), article no. 4, 2008.","DOI":"10.1145\/1410234.1410238"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T19:55:01Z","timestamp":1558122901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}