{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:17Z","timestamp":1725906437237},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_32","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T04:56:55Z","timestamp":1500958615000},"page":"439-449","source":"Crossref","is-referenced-by-count":1,"title":["Application Research on Network Attacks and Defenses with Zachman Framework"],"prefix":"10.1007","author":[{"given":"Chensi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"32_CR1","first-page":"27","volume":"4","author":"YL Zhu","year":"2013","unstructured":"Zhu, Y.L.: The current situation of network security and defense technology. Inf. Secur. 4, 27\u201328 (2013)","journal-title":"Inf. Secur."},{"key":"32_CR2","unstructured":"Talk About DoS Attack and DDoS Attack. http:\/\/netsecurity.51cto.com\/art\/200511\/11982.htm"},{"key":"32_CR3","first-page":"1943","volume":"9","author":"C Lin","year":"2005","unstructured":"Lin, C., Wang, Y., Li, Q.L.: Stochastic modeling and evaluation for network security. Chin. J. Comput. 9, 1943\u20131956 (2005)","journal-title":"Chin. J. Comput."},{"key":"32_CR4","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.3724\/SP.J.1016.2010.01748","volume":"9","author":"YZ Wang","year":"2010","unstructured":"Wang, Y.Z., Lin, C., Chen, X.Q., Fang, B.X.: Analysis for network attack-defense based on stochastic game model. Chin. J. Comput. 9, 1748\u20131762 (2010)","journal-title":"Chin. J. Comput."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"McDermott J.: Attack potential-based survivability modeling for high-consequence systems. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance, Washington D.C., pp. 119\u2013130 (2005)","DOI":"10.1109\/IWIA.2005.4"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Lye, K., Wing, J.M.: Game strategies in network security. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, vol. 4(1\u20132), pp. 71\u201386. Copen hagen (2002)","DOI":"10.1007\/s10207-004-0060-x"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Evangelopoulou, M., Johnson, C.W.: Empirical framework for situation awareness measurement techniques in network defense. In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/CyberSA.2015.7166132"},{"issue":"C","key":"32_CR8","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.compind.2015.06.010","volume":"79","author":"J Lapalme","year":"2016","unstructured":"Lapalme, J., Gerber, A., Merwe, A.V.D., et al.: Exploring the future of enterprise architecture. Comput. Ind. 79(C), 103\u2013113 (2016)","journal-title":"Comput. Ind."},{"issue":"6","key":"32_CR9","first-page":"740","volume":"48","author":"ZY Xu","year":"2015","unstructured":"Xu, Z.Y., Zhang, W.K., Yin, Y.H.: APT attacks and its defense. Commun. Technol. 48(6), 740\u2013745 (2015)","journal-title":"Commun. Technol."},{"issue":"3","key":"32_CR10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1147\/sj.263.0276","volume":"26","author":"JA Zachman","year":"1987","unstructured":"Zachman, J.A.: A framework for information systems architecture. IBM Syst. J. 26(3), 235\u2013254 (1987)","journal-title":"IBM Syst. J."},{"key":"32_CR11","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.jnca.2010.04.009","volume":"34","author":"P Aposolia","year":"2011","unstructured":"Aposolia, P., Hakima, C.: RFID-assisted indoor localization and the impact of interference on its performance. J. Netw. Comput. Appl. 34, 902\u2013913 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Nikolaidou, M., Enterprise, A.N., Engineering, I.S.: A model-based approach based on the Zachman framework. In: Proceedings of the 41st Hawaii International Conference on System Sciences, p. 399. IEEE Computer Society (2008)","DOI":"10.1109\/HICSS.2008.148"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Pereira, C.M., Sousa, P.: A method to define an enterprise architecture using the Zachman framework. In: ACM Symposium on Applied Computing, pp. 1366\u20131371. ACM (2004)","DOI":"10.1145\/967900.968175"},{"key":"32_CR14","first-page":"140","volume":"11","author":"XY Zhang","year":"2006","unstructured":"Zhang, X.Y.: Risks existing in applying ERP system and protective countermeasures. Forest Eng. 11, 140\u2013142 (2006)","journal-title":"Forest Eng."},{"issue":"2","key":"32_CR15","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10796-006-7977-8","volume":"8","author":"A Fatolahi","year":"2006","unstructured":"Fatolahi, A., Shams, F.: An investigation into applying UML to the Zachman framework. Inf. Syst. Front. 8(2), 133\u2013143 (2006)","journal-title":"Inf. Syst. Front."},{"key":"32_CR16","unstructured":"Liu, Y.: Application Research on IT Risk Management with Zachman Framework (2007)"},{"key":"32_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-35515-8_22","volume-title":"Digital Forensics and Cyber Crime","author":"C Blackwell","year":"2012","unstructured":"Blackwell, C.: A forensic framework for incident analysis applied to the insider threat. In: Gladyshev, P., Rogers, M.K. (eds.) ICDF2C 2011. LNICSSITE, vol. 88, pp. 268\u2013281. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-35515-8_22"},{"key":"32_CR18","first-page":"92","volume":"9","author":"CL Wu","year":"2015","unstructured":"Wu, C.L., Lin, J.J.: System security architecture of complex information system based on Zachman framework. Comput. Appl. Softw. 9, 92\u201396 (2015)","journal-title":"Comput. Appl. Softw."},{"key":"32_CR19","unstructured":"Lin, X.H.: The application of the JIT production system to construct with the Zachman framework, p. 5 (2005)"},{"key":"32_CR20","unstructured":"Zhang, C., Shi, X., Chen, D.: Safety analysis and optimization for networked avionics system. In: Digital Avionics Systems Conference, pp. 4C1-1\u20134C1-12. IEEE (2014)"},{"key":"32_CR21","unstructured":"Maconachy, W.V., Schou, C.D., Ragsdale, D., et al.: A model for information assurance: an integrated approach. In: Proceedings of the IEEE Workshop on Information Assurance and Security IEEE Cs (2001)"},{"key":"32_CR22","unstructured":"Zhao, W.: Research on Information Assurance Metrics and Comprehensive Evaluation (2006)"},{"issue":"2","key":"32_CR23","doi-asserted-by":"crossref","first-page":"29","DOI":"10.3390\/info7020029","volume":"7","author":"H Lyu","year":"2016","unstructured":"Lyu, H., Zhou, Z., Zhang, Z.: Measuring knowledge management performance in organizations: an integrative framework of balanced scorecard and fuzzy evaluation. Information 7(2), 29 (2016)","journal-title":"Information"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:13:58Z","timestamp":1569928438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":23,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-319-64701-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}