An effective attack scenario construction model based on identification of attack steps and stages. Alhaj, T. A., Siraj, M. M., Zainal, A., Idris, I., Nazir, A., Elhaj, F., & Darwish, T. International Journal of Information Security, 22(5):1481–1496, October, 2023.
Paper doi bibtex @Article{Alhaj:2023:EAS,
author = "Taqwa Ahmed Alhaj and Maheyzah Md Siraj and Anazida
Zainal and Inshirah Idris and Anjum Nazir and Fatin
Elhaj and Tasneem Darwish",
title = "An effective attack scenario construction model based
on identification of attack steps and stages",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1481--1496",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00701-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00701-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
Downloads: 0
{"_id":"wknHzXEfA9TqQTZRd","bibbaseid":"alhaj-siraj-zainal-idris-nazir-elhaj-darwish-aneffectiveattackscenarioconstructionmodelbasedonidentificationofattackstepsandstages-2023","author_short":["Alhaj, T. A.","Siraj, M. M.","Zainal, A.","Idris, I.","Nazir, A.","Elhaj, F.","Darwish, T."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Taqwa","Ahmed"],"propositions":[],"lastnames":["Alhaj"],"suffixes":[]},{"firstnames":["Maheyzah","Md"],"propositions":[],"lastnames":["Siraj"],"suffixes":[]},{"firstnames":["Anazida"],"propositions":[],"lastnames":["Zainal"],"suffixes":[]},{"firstnames":["Inshirah"],"propositions":[],"lastnames":["Idris"],"suffixes":[]},{"firstnames":["Anjum"],"propositions":[],"lastnames":["Nazir"],"suffixes":[]},{"firstnames":["Fatin"],"propositions":[],"lastnames":["Elhaj"],"suffixes":[]},{"firstnames":["Tasneem"],"propositions":[],"lastnames":["Darwish"],"suffixes":[]}],"title":"An effective attack scenario construction model based on identification of attack steps and stages","journal":"International Journal of Information Security","volume":"22","number":"5","pages":"1481–1496","month":"October","year":"2023","coden":"????","doi":"https://doi.org/10.1007/s10207-023-00701-2","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Sep 26 12:08:51 MDT 2023","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"https://link.springer.com/article/10.1007/s10207-023-00701-2","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","ajournal":"Int. J. Info. Sci.","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Alhaj:2023:EAS,\n author = \"Taqwa Ahmed Alhaj and Maheyzah Md Siraj and Anazida\n Zainal and Inshirah Idris and Anjum Nazir and Fatin\n Elhaj and Tasneem Darwish\",\n title = \"An effective attack scenario construction model based\n on identification of attack steps and stages\",\n journal = j-INT-J-INFO-SEC,\n volume = \"22\",\n number = \"5\",\n pages = \"1481--1496\",\n month = oct,\n year = \"2023\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-023-00701-2\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Tue Sep 26 12:08:51 MDT 2023\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"https://link.springer.com/article/10.1007/s10207-023-00701-2\",\n acknowledgement = ack-nhfb,\n ajournal = \"Int. J. Info. Sci.\",\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Alhaj, T. A.","Siraj, M. M.","Zainal, A.","Idris, I.","Nazir, A.","Elhaj, F.","Darwish, T."],"key":"Alhaj:2023:EAS","id":"Alhaj:2023:EAS","bibbaseid":"alhaj-siraj-zainal-idris-nazir-elhaj-darwish-aneffectiveattackscenarioconstructionmodelbasedonidentificationofattackstepsandstages-2023","role":"author","urls":{"Paper":"https://link.springer.com/article/10.1007/s10207-023-00701-2"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","dataSources":["fEXH7XH8oyBtpzKFi"],"keywords":[],"search_terms":["effective","attack","scenario","construction","model","based","identification","attack","steps","stages","alhaj","siraj","zainal","idris","nazir","elhaj","darwish"],"title":"An effective attack scenario construction model based on identification of attack steps and stages","year":2023}