{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:34:53Z","timestamp":1742913293484,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086231"},{"type":"electronic","value":"9783319086248"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_12","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"267-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Uncertainty Modeling: The Computational Economists\u2019 View on Cyberwarfare"],"prefix":"10.1007","author":[{"given":"Suchitra","family":"Abel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/0304-4076(94)01626-B","volume":"67","author":"N Cartwright","year":"1995","unstructured":"Cartwright, N.: Probabilities and experiments. J. Econom. 67, 47\u201359 (1995)","journal-title":"J. Econom."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-58648-4_4","volume-title":"Causal Models and Intelligent Data Management","author":"N Cartwright","year":"1999","unstructured":"Cartwright, N.: Causality: independence and determinism. In: Gammerman, A. (ed.) Causal Models and Intelligent Data Management, pp. 51\u201363. Springer, Berlin (1999)"},{"key":"12_CR3","volume-title":"Reasoning with Arbitrary Objects","author":"K Fine","year":"1985","unstructured":"Fine, K.: Reasoning with Arbitrary Objects. Blackwell, New York (1985)"},{"key":"12_CR4","volume-title":"Probabilistic Reasoning in Intelligent Systems","author":"J Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems. Morgan Kaufman, San Mateo (1988)"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/0004-3702(93)90169-C","volume":"59","author":"J Pearl","year":"1993","unstructured":"Pearl, J.: Belief networks revisited. Artif. Intell. 59, 49\u201356 (1993)","journal-title":"Artif. Intell."},{"key":"12_CR6","first-page":"1","volume-title":"Bayesian Networks and Probabilistic Reasoning","author":"J Pearl","year":"1994","unstructured":"Pearl, J.: From Bayesian networks to causal networks. In: Gammerman, A. (ed.) Bayesian Networks and Probabilistic Reasoning, pp. 1\u201331. Alfred Walter, London (1994)"},{"key":"12_CR7","unstructured":"United States Computer Emergency Readiness Team, Security updates available for Adobe flash player, Adobe reader, and Acrobat, http:\/\/www.us-cert.gov\/ncas\/current-activity?page=1. Accessed 10 Sept 2013"},{"key":"12_CR8","unstructured":"United States Computer Emergency Readiness Team, Microsoft releases September 2013 security bulletin, http:\/\/www.us-cert.gov\/ncas\/current-activity, Accessed 10 Sept 2013"},{"key":"12_CR9","unstructured":"What is Cloud Computing? http:\/\/aws.amazon.com\/what-is-cloud-computing\/"},{"key":"12_CR10","unstructured":"Google Elbows Into the Cloud, http:\/\/www.nytimes.com\/2013\/03\/13\/technology\/google-takes-on-amazon-and-microsoft-for-cloud-computing-services.html"},{"key":"12_CR11","unstructured":"Technical Report, HP Bristol, UK, Cloud stewardship Economics (2012)"},{"key":"12_CR12","unstructured":"Abel, S.: Application of Bayesian causal model for threat identification in the context of cloud usage by cloud Steward businesses, unpublished manuscript (2013)"},{"key":"12_CR13","unstructured":"Cox, P.A.: Mobile cloud computing, http:\/\/www.ibm.com\/developerworks\/cloud\/library\/cl-mobilecloudcomputing\/,. Accessed 11 March 2011"},{"key":"12_CR14","unstructured":"Abel, S.: Cybersecurity using Bayesian causal modeling in the context of mobile computing, including image usage, in mobile devices\u2014invited talk and powerpoint presentation at Nokia Research Lab, Sunnyvale, CA, 13 Aug 2013"},{"key":"12_CR15","unstructured":"Executive Order 13636: Improving critical infrastructure cybersecurity department of homeland security, integrated task force incentives study, analytic report, http:\/\/www.dhs.gov\/sites\/default\/files\/publications\/dhs-eo13636-analytic-report-cybersecurity-incentives-study.pdf. Accessed 12 June 2013"},{"key":"12_CR16","volume-title":"Theory of Games and Economic Behavior","author":"J von Neumann","year":"1944","unstructured":"von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)"},{"key":"12_CR17","isbn-type":"print","volume-title":"Microeconomic Theory","author":"A Mas-Colell","year":"1995","unstructured":"Mas-Colell, A., Whinston, M., Green, J.: Microeconomic Theory. Oxford University Press, Oxford (1995). ISBN 0-19-507340-1","ISBN":"https:\/\/id.crossref.org\/isbn\/0195073401"},{"key":"12_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840203","volume-title":"Theory of Decision Under Uncertainty","author":"I Gilboa","year":"2009","unstructured":"Gilboa, I.: Theory of Decision Under Uncertainty. Cambridge University Press, Cambridge (2009)"},{"key":"12_CR19","volume-title":"Variational Methods in Optimization","author":"DR Smith","year":"1998","unstructured":"Smith, D.R.: Variational Methods in Optimization. Dover, New York (1998)"},{"key":"12_CR20","unstructured":"Paisley, J.: Bayesian nonparametrics and big data, talk at the Columbia University School of Engineering, 22 Feb 2013"},{"key":"12_CR21","unstructured":"Statisticat, LLC, Big data and Bayesian inference, http:\/\/www.bayesian-inference.com\/softwarearticlesbigdata. Accessed 22 Feb 2014"},{"issue":"3","key":"12_CR22","first-page":"1","volume":"3","author":"M Maurya","year":"2013","unstructured":"Maurya, M., Vishwakarma, U.K., Lohia, P.: A study of statistical inference tools for uncertainty reasoning in target tracking. Int. J. Comput. Networking Wirel. Mobile Commun. 3(3), 1\u201310 (2013)","journal-title":"Int. J. Comput. Networking Wirel. Mobile Commun."},{"key":"12_CR23","unstructured":"Intelligence-Driven Security: A new model using big data. Speaker: Mr. Art Coviello, Executive Vice President, EMC, Executive Chairman, RSA, In: The 3rd Annual International Cyber Security Conference, The Yuval Ne\u2019eman Science, Technology & Security Workshop, Tel Aviv University, Israel"},{"key":"12_CR24","unstructured":"Homeland security report, http:\/\/www.oig.dhs.gov\/assets\/Mgmt\/2013\/OIG_13-42_Feb13.pdf"}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T03:32:26Z","timestamp":1675827146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_12","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}