{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:24:46Z","timestamp":1743045886064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551797"},{"type":"electronic","value":"9783030551803"}],"license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55180-3_9","type":"book-chapter","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:28:02Z","timestamp":1598311682000},"page":"114-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Automated System of Threat Propagation Using a Horizon of Events Model"],"prefix":"10.1007","author":[{"given":"Kilian","family":"Vasnier","sequence":"first","affiliation":[]},{"given":"Abdel-Illah","family":"Mouaddib","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Gatepaille","sequence":"additional","affiliation":[]},{"given":"St\u00e9phan","family":"Brunessaux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"9_CR1","unstructured":"Tridgell, A., Weaver, L., Baxter, J.: KnightCap: a chess program that learns by combining TD (lambda) with game-tree search. arXiv preprint cs\/9901002 (1999)"},{"key":"9_CR2","unstructured":"Miller, W.L., Ott, A., Saydjari, O.S., Hamilton, S.N.: Challenges in applying game theory to the domain of information warfare. In: Information Survivability Workshop (2002)"},{"issue":"2","key":"9_CR3","first-page":"12","volume":"4","author":"JV Molsa","year":"2005","unstructured":"Molsa, J.V., Jormakka, J.: Modelling information warfare as a game. J. Inform. Warfare 4(2), 12\u201325 (2005)","journal-title":"J. Inform. Warfare"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/fi8030034","volume":"8","author":"K Shafi","year":"2016","unstructured":"Shafi, K., Merrick, K., Hardhienata, M.: A survey of game theoretic approaches to modelling decision-making in information warfare scenarios. Future Internet 8(3), 34 (2016)","journal-title":"Future Internet"},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"R Mica","year":"1995","unstructured":"Mica, R., Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995)","journal-title":"Hum. Factors"},{"key":"9_CR6","unstructured":"Niklasson, L.: Extending the scope of situation analysis. In: 2008 11th International Conference on Information Fusion, pp. 1\u20138. IEEE (2008)"},{"key":"9_CR7","unstructured":"CEERAT PFT RENS: Manuel de l\u2019unit\u00e9 de renseignement de brigade. Minist\u00e8re de la d\u00e9fense (2016)"},{"key":"9_CR8","unstructured":"Schaeffer, J., Pijls, W., De Bruin, A., Plaat, A.: Exploiting graph properties of game trees. In: AAAI\/IAAI1, pp. 234\u2013239 (2002)"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1111\/j.1467-6486.1988.tb00043.x","volume":"25","author":"EL Quarantelli","year":"1998","unstructured":"Quarantelli, E.L.: Disaster crisis management: a summary of research findings. J. Manag. Stud. 25(4), 373\u2013385 (1998)","journal-title":"J. Manag. Stud."},{"key":"9_CR10","unstructured":"CEERAT RENS: Manuel d\u2019emploi du sous-groupement recherche multicapteurs. Minist\u00e8re de la d\u00e9fense (2016)"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0004-3702(87)90004-X","volume":"34","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: Game tree searching by min\/max approximation. Artif. Intell. 34(1), 77\u201396 (1987)","journal-title":"Artif. Intell."},{"key":"9_CR12","unstructured":"Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q., Roy, S.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences, pp. 1\u201310 (2010)"},{"key":"9_CR13","unstructured":"Scott, P., Rogova, G.: Crisis management in a data fusion synthetic task environment. In: Procedings of FUSION (2004)"},{"key":"9_CR14","unstructured":"Vasnier, K., Mouaddib, A.-I., Gatepaille, S., Brunessaux, S.: Multi-level information fusion and active perception framework: towards a military application. NATO SET-262 RSM on Artificial Intelligence for Military Multisensor Fusion Engines (2018)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Vasnier, K., Mouaddib, A.-I., Gatepaille, S., Brunessaux, S.: Multi-level information fusion approach with dynamic bayesian networks for an active perception of the environment. In 2018 21st International Conference on Information Fusion (FUSION), pp. 1844\u20131850. IEEE (2018)","DOI":"10.23919\/ICIF.2018.8455862"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Xiaobin, T., Yong, Z., Hongsheng, X., Xiaolin, C.: A markov game theory-based risk assessment model for network information system. In: International Conference on Computer Science and Software Engineering, vol. 3, pp. 1057\u20131061 (2008)","DOI":"10.1109\/CSSE.2008.949"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55180-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:51:42Z","timestamp":1598313102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55180-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"ISBN":["9783030551797","9783030551803"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55180-3_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"25 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}