iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSN.2014.68
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:11:18Z","timestamp":1729631478897,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/dsn.2014.68","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:38:58Z","timestamp":1412026738000},"page":"684-689","source":"Crossref","is-referenced-by-count":12,"title":["What Vulnerability Do We Need to Patch First?"],"prefix":"10.1109","author":[{"given":"Jin B.","family":"Hong","sequence":"first","affiliation":[]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Using centrality measures to rank the importance of the components of a compl ex network infrastructure","volume":"5508","author":"cadini","year":"2009","journal-title":"Proc CRITIS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615507"},{"key":"18","first-page":"18","article-title":"Identifying critical attack assets in dependency attack grap hs","author":"sawilla","year":"2008","journal-title":"Proc of ESORICS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459864"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.543-550"},{"key":"14","first-page":"127","article-title":"Ranking attack graphs","author":"mehta","year":"2006","journal-title":"Proc of RAID"},{"journal-title":"an annotated review of past papers on attack graphs","year":"2005","author":"lippmann","key":"11","doi-asserted-by":"crossref","DOI":"10.21236\/ADA431826"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.9"},{"key":"21","first-page":"113","article-title":"Mulval: A logic-based network security analyzer","author":"ou","year":"2005","journal-title":"Proc of USENIX Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536646"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.18"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159029"},{"journal-title":"Proc of WEIS","article-title":"Economics of security patch management","year":"2006","author":"cavusoglu","key":"1"},{"journal-title":"Proc of DSN","article-title":"Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees","year":"2012","author":"roy","key":"10"},{"journal-title":"Proc of ACSAC","article-title":"Practical attack graph generation for network defense","year":"2006","author":"ingols","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"journal-title":"NIST Patch Management Has Inherent Challenges","year":"0","author":"walker","key":"5"},{"key":"4","first-page":"40","article-title":"Creating a patch and vulnerability management program","volume":"800","author":"mell","year":"2005","journal-title":"NIST Special Publication"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_25"}],"event":{"name":"2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2014,6,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900116\/6903544\/06903625.pdf?arnumber=6903625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:36:10Z","timestamp":1602689770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6903625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dsn.2014.68","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}