{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:04:58Z","timestamp":1730318698540,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T00:00:00Z","timestamp":1461024000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,19]]},"DOI":"10.1145\/2898375.2898390","type":"proceedings-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T21:09:21Z","timestamp":1460668161000},"page":"99-108","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Software and attack centric integrated threat modeling for quantitative risk assessment"],"prefix":"10.1145","author":[{"given":"Bradley","family":"Potteiger","sequence":"first","affiliation":[{"name":"Vanderbilt University, Nashville, TN"}]},{"given":"Goncalo","family":"Martins","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, CO"}]},{"given":"Xenofon","family":"Koutsoukos","sequence":"additional","affiliation":[{"name":"Vanderbilt University, Nashville, TN"}]}],"member":"320","published-online":{"date-parts":[[2016,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Critical security controls. SANS Institute. Critical security controls. SANS Institute."},{"volume-title":"nist, october 29","year":"2013","key":"e_1_3_2_1_2_1","unstructured":"Preliminary cybersecurity framework. nist, october 29 , 2013 . Cybersecurity, Improving Critical Infrastructure . Preliminary cybersecurity framework. nist, october 29, 2013. Cybersecurity, Improving Critical Infrastructure."},{"key":"e_1_3_2_1_3_1","unstructured":"First. Common vulnerability scoring system v3.0 specification document. First. Common vulnerability scoring system v3.0 specification document."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40196-1_15"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Workshop on Intelligent Signal Processing","volume":"17","author":"Ledeczi A.","year":"2001","unstructured":"A. Ledeczi , M. Maroti , A. Bakay , G. Karsai , J. Garrett , C. Thomason , G. Nordstrom , J. Sprinkle , and P. Volgyesi . The generic modeling environment . In Workshop on Intelligent Signal Processing , Budapest, Hungary , volume 17 , page 1 , 2001 . A. Ledeczi, M. Maroti, A. Bakay, G. Karsai, J. Garrett, C. Thomason, G. Nordstrom, J. Sprinkle, and P. Volgyesi. The generic modeling environment. In Workshop on Intelligent Signal Processing, Budapest, Hungary, volume 17, page 1, 2001."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume":"2015","author":"Martins G.","year":"2015","unstructured":"G. Martins , S. Bhatia , X. Koutsoukos , K. Stouffer , C. Tang , and R. Candell . Towards a systematic threat modeling approach for cyber-physical systems. In Resilience Week (RWS) , 2015 , pages 1 -- 6 . IEEE, 2015 . G. Martins, S. Bhatia, X. Koutsoukos, K. Stouffer, C. Tang, and R. Candell. Towards a systematic threat modeling approach for cyber-physical systems. In Resilience Week (RWS), 2015, pages 1--6. IEEE, 2015.","journal-title":"In Resilience Week (RWS)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604049"},{"volume-title":"Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'05)","year":"2005","author":"Myagmar S.","key":"e_1_3_2_1_8_1","unstructured":"S. Myagmar , A. J. Lee , and W. Yurcik . Threat modeling as a basis for security requirements . In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'05) , Paris, France , 2005 . S. Myagmar, A. J. Lee, and W. Yurcik. Threat modeling as a basis for security requirements. In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'05), Paris, France, 2005."},{"volume-title":"Oxford iot top ten. https:\/\/www.owasp.org\/images\/7\/71\/Internet\\_of\\_Things\\_Top\\_Ten\\_2014-OWASP.pdf","year":"2014","author":"OWASP.","key":"e_1_3_2_1_9_1","unstructured":"OWASP. Oxford iot top ten. https:\/\/www.owasp.org\/images\/7\/71\/Internet\\_of\\_Things\\_Top\\_Ten\\_2014-OWASP.pdf , 2014 . OWASP. Oxford iot top ten. https:\/\/www.owasp.org\/images\/7\/71\/Internet\\_of\\_Things\\_Top\\_Ten\\_2014-OWASP.pdf, 2014."},{"volume-title":"Threat modeling. https:\/\/www.owasp.org\/index.php\/Threat\\_Risk\\_Modeling","year":"2015","author":"OWASP.","key":"e_1_3_2_1_10_1","unstructured":"OWASP. Threat modeling. https:\/\/www.owasp.org\/index.php\/Threat\\_Risk\\_Modeling , 2015 . OWASP. Threat modeling. https:\/\/www.owasp.org\/index.php\/Threat\\_Risk\\_Modeling, 2015."},{"volume-title":"Trike v. 1 methodology document {draft}. URL: http:\/\/dymaxion.org\/trike\/Trike_v1_Methodology_Documentdraft.pdf","year":"2005","author":"Saitta P.","key":"e_1_3_2_1_11_1","unstructured":"P. Saitta , B. Larcom , and M. Eddington . Trike v. 1 methodology document {draft}. URL: http:\/\/dymaxion.org\/trike\/Trike_v1_Methodology_Documentdraft.pdf , 2005 . P. Saitta, B. Larcom, and M. Eddington. Trike v. 1 methodology document {draft}. URL: http:\/\/dymaxion.org\/trike\/Trike_v1_Methodology_Documentdraft.pdf, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30101-1_17"},{"volume-title":"Threat Modeling - Designing for Security","year":"2014","author":"Shostack A.","key":"e_1_3_2_1_13_1","unstructured":"A. Shostack . Threat Modeling - Designing for Security . Wiley , 2014 . A. Shostack. Threat Modeling - Designing for Security. Wiley, 2014."},{"volume-title":"Special Publication 800-30","year":"2002","author":"Stoneburner G.","key":"e_1_3_2_1_14_1","unstructured":"G. Stoneburner , A. Goguen , and A. Feringa . Risk management guide for information technology systems. Recommendations of the National Institute of Standards and Technology (NIST) , Special Publication 800-30 , 2002 . G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800-30, 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"first-page":"317","volume-title":"Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis","author":"Ucedav\u00e9lez T.","key":"e_1_3_2_1_16_1","unstructured":"T. Ucedav\u00e9lez and M. M. Morana . Intro to pasta . Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , pages 317 -- 342 . T. Ucedav\u00e9lez and M. M. Morana. Intro to pasta. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, pages 317--342."}],"event":{"name":"HotSoS '16: HotSos 2016 Science of Security","acronym":"HotSoS '16","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898375.2898390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T08:03:29Z","timestamp":1673683409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898375.2898390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,19]]},"references-count":16,"alternative-id":["10.1145\/2898375.2898390","10.1145\/2898375"],"URL":"https:\/\/doi.org\/10.1145\/2898375.2898390","relation":{},"subject":[],"published":{"date-parts":[[2016,4,19]]},"assertion":[{"value":"2016-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}