{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T06:06:29Z","timestamp":1709186789533},"reference-count":18,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1016\/j.compeleceng.2011.04.010","type":"journal-article","created":{"date-parts":[[2011,5,22]],"date-time":"2011-05-22T20:31:15Z","timestamp":1306096275000},"page":"624-628","source":"Crossref","is-referenced-by-count":10,"title":["Attribution of attack trees"],"prefix":"10.1016","volume":"37","author":[{"given":"John N.","family":"Whitley","sequence":"first","affiliation":[]},{"given":"Raphael C.-W.","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"David J.","family":"Parish","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2011.04.010_b0005","first-page":"21","article-title":"Attack trees: modeling security threats","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0010","doi-asserted-by":"crossref","unstructured":"Camtepe S, Yener B. Modeling and detection of complex attacks. In: Proc. SecureComm \u201907, IEEE; 2007. p. 234\u201343.","DOI":"10.1109\/SECCOM.2007.4550338"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0015","doi-asserted-by":"crossref","unstructured":"Dewri R, Poolsappasit N, Ray I, Whitley D. Optimal security hardening using multi-objective optimization on attack tree models of networks. In: Proc. ACM-CCS \u201907, ACM; 2007. p. 204\u201313.","DOI":"10.1145\/1315245.1315272"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0020","doi-asserted-by":"crossref","unstructured":"Jurgenson A, Willemson J. Computing exact outcomes of multi-parameter attack trees. In: Proc. OTM \u201908, LNCS Vol. 5332, Springer; 2008. p. 1036\u201351.","DOI":"10.1007\/978-3-540-88873-4_8"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0025","doi-asserted-by":"crossref","unstructured":"Muthuprasanna M, Manimaran G. Distributed divide-and-conquer techniques for effective ddos attack defenses. In: Proc. IEEE ICDCS \u201908, IEEE; 2008. p. 93\u2013102.","DOI":"10.1109\/ICDCS.2008.10"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0030","doi-asserted-by":"crossref","unstructured":"Morais A, Martins E, Cavalli A, Jimenez W. Security protocol testing using attack trees. In: Proc. CSE \u201909, IEEE; 2009. p. 690\u20137.","DOI":"10.1109\/CSE.2009.206"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0035","unstructured":"Zhu N, Chen X-Y, Zhang Y-F, Xin S-Y. Design and application of penetration attack tree model oriented to attack resistance test. In: Proc. CSSE \u201908, IEEE; 2008. p. 622\u20136."},{"key":"10.1016\/j.compeleceng.2011.04.010_b0040","doi-asserted-by":"crossref","unstructured":"Buldas A, Laud P, Priisalu J, Saarepera M, Willemson J. Rational choice of security measures via multi-parameter attack trees. In: Proc. CRITIS \u201906, LNCS Vol. 4347, Springer; 2006. p. 235\u201348.","DOI":"10.1007\/11962977_19"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0045","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/S0167-4048(03)00313-4","article-title":"Fault trees for security system design and analysis","volume":"22","author":"Brooke","year":"2006","journal-title":"Comput Security"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0050","doi-asserted-by":"crossref","unstructured":"Jurgenson A, Willemson J. Processing multi-parameter attack trees with estimated parameter values. In: Proc. IWSEC \u201907, LNCS Vol. 4752, Springer; 2007. p. 308\u201319.","DOI":"10.1007\/978-3-540-75651-4_21"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0055","doi-asserted-by":"crossref","unstructured":"Mauw S, Oostdijk M. Foundations of attack trees. In: Proc. ICISC \u201905, LNCS Vol. 3935, Springer; 2005. p. 186\u201398.","DOI":"10.1007\/11734727_17"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0060","doi-asserted-by":"crossref","unstructured":"Poolsappasit N, Ray I. Investigating computer attacks using attack trees. In: Advances in digital forensics III, Vol. 242. Boston: Springer; 2007. p. 331\u201343.","DOI":"10.1007\/978-0-387-73742-3_23"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0065","unstructured":"Tidwell T, Larson R, Fitch K, Hale J. Modeling internet attacks. In: Proc. IEEE IWAS \u201901, IEEE; 2001. p. 54\u20139."},{"key":"10.1016\/j.compeleceng.2011.04.010_b0070","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1016\/j.ins.2005.08.004","article-title":"Owa trees and their role in security modeling using attack trees","volume":"176","author":"Yager","year":"2005","journal-title":"Inf Sci"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0075","unstructured":"Bistarelli S, Fioravanti F, Peretti P. Defense trees for economic evaluation of security investments. In: Proc. ARES \u201906."},{"key":"10.1016\/j.compeleceng.2011.04.010_b0080","doi-asserted-by":"crossref","unstructured":"Kordy B, Mauw S, Radomirovi \u0107 S, Schweitzer P. Foundations of attack\u2013defense trees. In: Proc. FAST \u201910, LNCS, to appear, Springer; 2010.","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0085","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","article-title":"Integrating cyber attacks within fault trees","volume":"94","author":"Fovino","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.compeleceng.2011.04.010_b0090","doi-asserted-by":"crossref","unstructured":"Jurgenson A, Willemson J. Serial model for attack tree computations. In: Proc. ICISC \u201909, LNCS Vol. 5984, Springer; 2009. p. 118\u201328.","DOI":"10.1007\/978-3-642-14423-3_9"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790611000553?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790611000553?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T02:18:36Z","timestamp":1560219516000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790611000553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["S0045790611000553"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2011.04.010","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2011,7]]}}}