{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:13Z","timestamp":1742913013264,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493417"},{"type":"electronic","value":"9783030493424"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49342-4_23","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:49:30Z","timestamp":1597405770000},"page":"235-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Threat Propagation Model Through a Topographical Environment Modelling"],"prefix":"10.1007","author":[{"given":"Kilian","family":"Vasnier","sequence":"first","affiliation":[]},{"given":"Abdel-Illah","family":"Mouaddib","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Gatepaille","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Brunessaux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley, M.R., Mica, R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995)","journal-title":"Hum. Factors"},{"key":"23_CR2","unstructured":"Niklasson, L.: Extending the scope of situation analysis. In: 2008 11th International Conference on Information Fusion, pp. 1\u20138. IEEE (2008)"},{"key":"23_CR3","unstructured":"Scott, P., Rogova, G.: Crisis management in a data fusion synthetic task environment. In: Proceedings of FUSION 2004 (2004)"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1111\/j.1467-6486.1988.tb00043.x","volume":"25","author":"EL Quarantelli","year":"1988","unstructured":"Quarantelli, E.L.: Disaster crisis management: a summary of research findings. J. Manag. Stud. 25(4), 373\u2013385 (1988)","journal-title":"J. Manag. Stud."},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0004-3702(87)90004-X","volume":"34","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: Game tree searching by min\/max approximation. Artif. Intell. 34(1), 77\u201396 (1987)","journal-title":"Artif. Intell."},{"key":"23_CR6","unstructured":"Baxter, J., Tridgell, A., Weaver, L.: Knightcap: a chess program that learns by combining td (lambda) with game-tree search. arXiv preprint cs\/9901002 (1999)"},{"key":"23_CR7","unstructured":"Plaat, A., Schaeffer, J., Pijls, W., De Bruin, A.: Exploiting graph properties of game trees. In: AAAI\/IAAI, vol. 1, pp. 234\u2013239 (1996)"},{"issue":"2","key":"23_CR8","first-page":"12","volume":"4","author":"J Jormakka","year":"2005","unstructured":"Jormakka, J., M\u00f6ls\u00e4, J.V.: Modelling information warfare as a game. J. Inf. Warfare 4(2), 12\u201325 (2005)","journal-title":"J. Inf. Warfare"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Roy, S., Ellis, C., et al.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/HICSS.2010.35"},{"key":"23_CR10","unstructured":"Hamilton, et al.: Challenges in applying game theory to the domain of information warfare. In: Information Survivability Workshop (ISW) (2002)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Xiaolin, C., et al.: A Markov game theory-based risk assessment model for network information system. In: 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 1057\u20131061. IEEE (2008)","DOI":"10.1109\/CSSE.2008.949"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Vasnier, K., et al.: Multi-level information fusion approach with dynamic bayesian networks for an active perception of the environment. In: 2018 21st International Conference on Information Fusion (FUSION) on IEEE, pp. 1844\u20131850 (2018)","DOI":"10.23919\/ICIF.2018.8455862"},{"key":"23_CR13","unstructured":"Vasnier, K., et al.: Multi-level information fusion and active perception framework: towards a military application. In: Procedings of NATO SET-262 RSM on Artificial Intelligence for Military Multisensor Fusion Engines (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49342-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:56:56Z","timestamp":1597406216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49342-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030493417","9783030493424"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49342-4_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auburn, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}