{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:01:05Z","timestamp":1726066865850},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030334314"},{"type":"electronic","value":"9783030334321"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33432-1_4","type":"book-chapter","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T19:02:44Z","timestamp":1580842964000},"page":"63-88","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint"],"prefix":"10.1007","author":[{"given":"Chen","family":"Zhong","sequence":"first","affiliation":[]},{"given":"John","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis, \u201cMastering the game of go with deep neural networks and tree search,\u201d Nature, vol. 529, pp. 484\u2013489, 2016.","journal-title":"Nature"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"A. D\u2019Amico and K. Whitley, \u201cThe real work of computer network defense analysts,\u201d in VizSEC 2007, pp. 19\u201337, Springer, 2008.","DOI":"10.1007\/978-3-540-78243-8_2"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"J. Yen, R. F. Erbacher, C. Zhong, and P. Liu, \u201cCognitive process,\u201d in Cyber Defense and Situational Awareness, pp. 119\u2013144, Springer, 2014.","DOI":"10.1007\/978-3-319-11391-3_7"},{"key":"4_CR4","volume-title":"The state of malware detection and prevention","author":"P Institute","year":"2016","unstructured":"P. Institute, \u201cThe state of malware detection and prevention,\u201d Cyphort, 2016."},{"key":"4_CR5","unstructured":"FireEye, \u201cThe total cost of handling too many alerts versus managing risk,\u201d 2016."},{"key":"4_CR6","volume-title":"\u201cLearning from experts\u2019 experience: Toward automated cyber security data triage\u201d, IEEE Systems Journal,","author":"C Zhong","year":"2018","unstructured":"C. Zhong, J. Yen, P. Liu, and R. F. Erbacher, \u201cLearning from experts\u2019 experience: Toward automated cyber security data triage,\u201d IEEE Systems Journal, 2018."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"C. Zhong, J. Yen, P. Liu, R. F. Erbacher, C. Garneau, and B. Chen, \u201cStudying analysts\u2019 data triage operations in cyber defense situational analysis,\u201d in Theory and Models for Cyber Situation Awareness, pp. 128\u2013169, Springer, 2017.","DOI":"10.1007\/978-3-319-61152-5_6"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"T Bass","year":"2000","unstructured":"T. Bass, \u201cIntrusion detection systems and multisensor data fusion,\u201d Communications of the ACM, vol. 43, no. 4, pp. 99\u2013105, 2000.","journal-title":"Communications of the ACM"},{"issue":"12","key":"4_CR9","first-page":"31","volume":"55","author":"D P Biros","year":"2001","unstructured":"D. P. Biros and T. Eppich, \u201cTheme: security-human element key to intrusion detection,\u201d Signal-Fairfax, vol. 55, no. 12, pp. 31\u201334, 2001.","journal-title":"Signal-Fairfax"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1146\/annurev.psych.47.1.273","volume":"47","author":"K A Ericsson","year":"1996","unstructured":"K. A. Ericsson and A. C. Lehmann, \u201cExpert and exceptional performance: Evidence of maximal adaptation to task constraints,\u201d Annual review of psychology, vol. 47, no. 1, pp. 273\u2013305, 1996.","journal-title":"Annual review of psychology"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"C. Zhong, D. Samuel, J. Yen, P. Liu, R. Erbacher, S. Hutchinson, R. Etoty, H. Cam, and W. Glodek, \u201cRankaoh: Context-driven similarity-based retrieval of experiences in cyber analysis,\u201d in Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2014 IEEE International Inter-Disciplinary Conference on, pp. 230\u2013236, IEEE, 2014.","DOI":"10.1109\/CogSIMA.2014.6816567"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2018.02.011","volume":"76","author":"C Zhong","year":"2018","unstructured":"C. Zhong, T. Lin, P. Liu, J. Yen, and K. Chen, \u201cA cyber security data triage operation retrieval system,\u201d Computers & Security, vol. 76, pp. 12\u201331, 2018.","journal-title":"Computers & Security"},{"issue":"3","key":"4_CR13","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1057\/ivs.2010.5","volume":"9","author":"R F Erbacher","year":"2010","unstructured":"R. F. Erbacher, D. A. Frincke, P. C. Wong, S. Moody, and G. Fink, \u201cA multi-phase network situational awareness cognitive task analysis,\u201d Information Visualization, vol. 9, no. 3, pp. 204\u2013219, 2010.","journal-title":"Information Visualization"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"R. Sadoddin and A. Ghorbani, \u201cAlert correlation survey: framework and techniques,\u201d in Proceedings of the 2006 international conference on privacy, security and trust: bridge the gap between PST technologies and business services, pp. 37\u201338, ACM, 2006.","DOI":"10.1145\/1501434.1501479"},{"key":"4_CR15","unstructured":"ArcSight, \u201cBuilding a successful security operations center,\u201d 2010. Research 014-052809-09."},{"key":"4_CR16","volume-title":"Designing and Building Security Operations Center","author":"D Nathans","year":"2014","unstructured":"D. Nathans, Designing and Building Security Operations Center. Syngress, 2014."},{"key":"4_CR17","volume-title":"Security information and event management (SIEM) implementation","author":"D Miller","year":"2010","unstructured":"D. Miller, S. Harris, A. Harper, S. VanDyke, and C. Blask, Security information and event management (SIEM) implementation. McGraw Hill Professional, 2010."},{"key":"4_CR18","unstructured":"McAfee, \u201cSiem best practices: Correlation rule and engine debugging,\u201d 2014. Report No. PD25633."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"C. Zhong, J. Yen, P. Liu, and R. F. Erbacher, \u201cAutomate cybersecurity data triage by leveraging human analysts\u2019 cognitive process,\u201d in Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on, pp. 357\u2013363, IEEE, 2016.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.41"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"C. Zhong, J. Yen, P. Liu, R. Erbacher, R. Etoty, and C. Garneau, \u201cAn integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes,\u201d in Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 8\u20139, ACM, 2015.","DOI":"10.1145\/2746194.2746203"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"C. Zhong, J. Yen, P. Liu, R. Erbacher, R. Etoty, and C. Garneau, \u201cArsca: a computer tool for tracing the cognitive processes of cyber-attack analysis,\u201d in Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2015 IEEE International Inter-Disciplinary Conference on, pp. 165\u2013171, IEEE, 2015.","DOI":"10.1109\/COGSIMA.2015.7108193"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"K. Cook, G. Grinstein, M. Whiting, M. Cooper, P. Havig, K. Liggett, B. Nebesh, and C. L. Paul, \u201cVast challenge 2012: Visual analytics for big data,\u201d in Visual Analytics Science and Technology (VAST), 2012 IEEE Conference on, pp. 251\u2013255, IEEE, 2012.","DOI":"10.1109\/VAST.2012.6400529"}],"container-title":["Adaptive Autonomous Secure Cyber Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33432-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T19:09:40Z","timestamp":1580843380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33432-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030334314","9783030334321"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33432-1_4","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}