{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:28:04Z","timestamp":1730291284634,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003711","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/qrs51102.2020.00046","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:23:35Z","timestamp":1607729015000},"page":"285-296","source":"Crossref","is-referenced-by-count":0,"title":["Attack Graph Auto-Generation for Blockchains based on Bigraphical Reaction Systems"],"prefix":"10.1109","author":[{"given":"Lian","family":"Yu","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanbing","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Bei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39"},{"key":"ref38","first-page":"151","article-title":"Generation method of attack graph based on rete algorithm","volume":"44","author":"zihua","year":"2018","journal-title":"Compuer Engineering"},{"journal-title":"Information Security and Communications Privacy","article-title":"Attack graph generation based on security administrator information","year":"2011","author":"shi","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176275"},{"key":"ref37","first-page":"2133","article-title":"Attack graph generation algorithm for large-scale network system","volume":"50","author":"yun","year":"2013","journal-title":"Journal of Computer research and development"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.11"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2575444"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2172\/573291"},{"journal-title":"Ph D thesis","article-title":"Domain-specific modelling languages in bigraphs","year":"2013","author":"perrone","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231985"},{"key":"ref2","article-title":"Mulval: A logic-based network security analyzer","volume":"8","author":"appel","year":"2005","journal-title":"USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626661"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599799"},{"key":"ref21","first-page":"1","article-title":"Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners","author":"modi","year":"2019","journal-title":"2019 10th Inter-national Conference on Computing Communication and Networking Technologies (ICCCNT)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532071"},{"article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254313"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"article-title":"A hierarchical network security risk evaluation approach based on multi-goal attack graph","year":"2009","author":"chen","key":"ref10"},{"journal-title":"Ph D thesis","article-title":"Sortings and Bigraphs","year":"2008","author":"debois","key":"ref11"},{"year":"0","key":"ref40","article-title":"The Scala Programming Language"},{"key":"ref12","article-title":"Big red: A development environment for bigraphs","volume":"61","author":"faithfull","year":"2013","journal-title":"Electronic Communications of the EASST"},{"key":"ref13","first-page":"1633","article-title":"Vulnerability model of dis-tributed systems based on reliability theory","volume":"17","author":"feng","year":"2006","journal-title":"Ruan Jian Xue Bao(Journal of Software)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11767954_8"},{"first-page":"101","article-title":"Attack graph generation method based on privilege escalation matrix","year":"2019","author":"hu","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.03.052"},{"key":"ref19","article-title":"Depth-first method for attack graph generation [j]","volume":"2","author":"man","year":"2009","journal-title":"Journal of Jilin University (Engineering and Technology Edition)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.66.10795"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172752"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11690634_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2007.145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30982-3_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924300"},{"year":"0","key":"ref49","article-title":"Eclipse Attacks on Blockchains’Peer-to-Peer Network"},{"journal-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation","article-title":"Practical Byzantine Fault Tolerance","year":"1999","author":"castro","key":"ref9"},{"year":"0","key":"ref46"},{"year":"0","key":"ref45"},{"year":"0","key":"ref48","article-title":"Parity Multisig Wallet Attack"},{"year":"0","key":"ref47"},{"year":"0","key":"ref42","article-title":"Mining malware"},{"year":"0","key":"ref41","article-title":"Selfish mining attack"},{"year":"0","key":"ref44"},{"year":"0","key":"ref43"}],"event":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)","start":{"date-parts":[[2020,12,11]]},"location":"Macau, China","end":{"date-parts":[[2020,12,14]]}},"container-title":["2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9282732\/9282275\/09282286.pdf?arnumber=9282286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:58Z","timestamp":1656453298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9282286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/qrs51102.2020.00046","relation":{},"subject":[],"published":{"date-parts":[[2020,12]]}}}