{"id":"https://openalex.org/W4394001848","doi":"https://doi.org/10.1007/978-3-031-57259-3_10","title":"Fuzzy quantitative attack tree analysis","display_name":"Fuzzy quantitative attack tree analysis","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4394001848","doi":"https://doi.org/10.1007/978-3-031-57259-3_10"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-57259-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-57259-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-57259-3_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-57259-3_10.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036479528","display_name":"Thi Kim Nhung Dang","orcid":"https://orcid.org/0000-0002-3235-5952"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Thi Kim Nhung Dang","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-3235-5952","affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066676005","display_name":"Milan Lopuha\u00e4-Zwakenberg","orcid":"https://orcid.org/0000-0001-5687-854X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Milan Lopuha\u00e4-Zwakenberg","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0001-5687-854X","affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053065289","display_name":"Mari\u00eblle Stoelinga","orcid":"https://orcid.org/0000-0001-6793-8165"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mari\u00eblle Stoelinga","raw_affiliation_strings":["Radboud University, Nijmegen, The Netherlands","University of Twente, Enschede, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0001-6793-8165","affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]},{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036479528"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":6.1205,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.96748793,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"210","last_page":"231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11303","display_name":"Bayesian Modeling and Causal Inference","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12135","display_name":"Fuzzy Systems and Optimization","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8417884111404419},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5452994108200073},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5152616500854492},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4985620975494385},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4110427796840668},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07686546444892883}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8417884111404419},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5452994108200073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5152616500854492},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4985620975494385},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4110427796840668},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07686546444892883},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-031-57259-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-57259-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-57259-3_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/a5a4afb7-7444-429f-b028-c941bcb6212d","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/a5a4afb7-7444-429f-b028-c941bcb6212d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dang, T K N, Lopuha\u00e4-Zwakenberg, M & Stoelinga, M 2024, Fuzzy quantitative attack tree analysis. in D Beyer & A Cavalcanti (eds), Fundamental Approaches to Software Engineering - 27th International Conference, FASE 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14573 LNCS, Springer, pp. 210-231, 27th International Conference on Fundamental Approaches to Software Engineering, FASE 2024, Luxembourg City, Luxembourg, 6/04/24. https://doi.org/10.1007/978-3-031-57259-3_10","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/306308","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/306308","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/306308/306308.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in monograph or in proceedings"},{"id":"pmh:oai:ris.utwente.nl:openaire/a5a4afb7-7444-429f-b028-c941bcb6212d","is_oa":true,"landing_page_url":"https://research.utwente.nl/files/479257002/978-3-031-57259-3_10.pdf","pdf_url":"https://ris.utwente.nl/ws/files/479257002/978-3-031-57259-3_10.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dang, T K N, Lopuha\u00e4-Zwakenberg, M & Stoelinga, M 2024, Fuzzy quantitative attack tree analysis. in D Beyer & A Cavalcanti (eds), Fundamental Approaches to Software Engineering - 27th International Conference, FASE 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14573 LNCS, Springer, pp. 210-231, 27th International Conference on Fundamental Approaches to Software Engineering, FASE 2024, Luxembourg City, Luxembourg, 6/04/24. https://doi.org/10.1007/978-3-031-57259-3_10","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.5281/zenodo.10554728","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.10554728","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-57259-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-57259-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-57259-3_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3373991914","display_name":null,"funder_award_id":"101008233","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8491077145","display_name":"Integrating Safety and Cybersecurity through Stochastic Model Checking","funder_award_id":"864075","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394001848.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1163800574","https://openalex.org/W1971998016","https://openalex.org/W1974661450","https://openalex.org/W2041245974","https://openalex.org/W2059593501","https://openalex.org/W2059785867","https://openalex.org/W2065893491","https://openalex.org/W2086871667","https://openalex.org/W2094876215","https://openalex.org/W2096349415","https://openalex.org/W2111354300","https://openalex.org/W2121337044","https://openalex.org/W2130537002","https://openalex.org/W2136208545","https://openalex.org/W2146024157","https://openalex.org/W2157041604","https://openalex.org/W2520993935","https://openalex.org/W2583115580","https://openalex.org/W2765887928","https://openalex.org/W2804142070","https://openalex.org/W2910240920","https://openalex.org/W2981438079","https://openalex.org/W3000645163","https://openalex.org/W3085934296","https://openalex.org/W3154744645","https://openalex.org/W4210514249","https://openalex.org/W4210559106","https://openalex.org/W4211007335","https://openalex.org/W4236868557","https://openalex.org/W4240278385","https://openalex.org/W4245152641","https://openalex.org/W4248958492","https://openalex.org/W4311413143","https://openalex.org/W4317435533","https://openalex.org/W4320006675","https://openalex.org/W6892532162"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Abstract":[0],"Attack":[1],"trees":[2],"are":[3,50],"important":[4,29],"for":[5,103,116],"security,":[6],"as":[7,32],"they":[8],"help":[9],"to":[10,56,69,85,122,171],"identify":[11],"weaknesses":[12],"and":[13,37],"vulnerabilities":[14],"in":[15,43,76],"a":[16,23,66,93,113,131,162,168],"system.":[17],"Quantitative":[18],"attack":[19,86,146,153],"tree":[20,87],"analysis":[21,45],"supports":[22],"number":[24,133],"security":[25],"metrics,":[26],"which":[27],"formulate":[28],"KPIs":[30],"such":[31,71],"the":[33,48,144,149,152,174],"shortest,":[34],"most":[35,123],"likely":[36],"cheapest":[38],"attacks.":[39],"A":[40],"key":[41],"bottleneck":[42],"quantitative":[44,124],"is":[46,65,130],"that":[47,120,166],"values":[49,99,119],"usually":[51],"not":[52],"known":[53],"exactly,":[54],"due":[55],"insufficient":[57],"data":[58],"and/or":[59],"lack":[60],"of":[61,90,96,105,151],"knowledge.":[62],"Fuzzy":[63],"logic":[64],"prominent":[67],"framework":[68],"handle":[70],"uncertain":[72],"values,":[73],"with":[74,155],"applications":[75],"numerous":[77],"domains.":[78],"While":[79],"several":[80],"studies":[81],"proposed":[82],"fuzzy":[83,97,106,117,132,156,176],"approaches":[84],"analysis,":[88],"none":[89],"them":[91],"provided":[92],"firm":[94],"definition":[95],"metric":[98,118,128,177],"or":[100],"generic":[101,114],"algorithms":[102],"computation":[104],"metrics.":[107,125],"In":[108,158],"this":[109],"work,":[110],"we":[111,142,160],"define":[112],"formulation":[115],"applies":[121],"The":[126],"resulting":[127],"value":[129],"obtained":[134,140],"by":[135],"following":[136],"Zadeh\u2019s":[137],"extension":[138],"principle,":[139],"when":[141],"equip":[143],"basis":[145],"steps,":[147],"i.e.,":[148],"leaves":[150],"trees,":[154],"numbers.":[157],"addition,":[159],"prove":[161],"modular":[163],"decomposition":[164],"theorem":[165],"yields":[167],"bottom-up":[169],"algorithm":[170],"efficiently":[172],"calculate":[173],"top":[175],"value.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
