{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:17:41Z","timestamp":1740097061260,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319103730"},{"type":"electronic","value":"9783319103747"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10374-7_1","type":"book-chapter","created":{"date-parts":[[2014,10,18]],"date-time":"2014-10-18T04:51:00Z","timestamp":1413607860000},"page":"1-18","source":"Crossref","is-referenced-by-count":1,"title":["Situational Awareness, Sensemaking, and Situation Understanding in Cyber Warfare"],"prefix":"10.1007","author":[{"given":"Yan","family":"Yufik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,9,27]]},"reference":[{"key":"1_CR1","unstructured":"Alburt, L., Lawrence, L. 2003. Chess Rules of Thumb. Chess Research Center, N.Y."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Barford, P., Dacier, M., Dietterich, T. G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang, C., Yen, J. 2010. Cyber SA: Situational awareness for cyber defense. In: S. Jajodia, P. Liu, V. Swarup, C.Wang. (Eds.) Cyber Situational Awareness. Issues and Research. Springer. pp. 3-4.","DOI":"10.1007\/978-1-4419-0140-8_1"},{"key":"1_CR3","doi-asserted-by":"crossref","DOI":"10.21236\/AD0670563","volume-title":"On the importance of different components in a multi component system. Technical Report","author":"ZW Birnbaum","year":"1968","unstructured":"Birnbaum, Z.W. 1968. On the importance of different components in a multi component system. Technical Report, Washington University Seattle Lab of Statistical Research, Seattle, WA."},{"key":"1_CR4","unstructured":"D\u2019Amico A., Whitley, K., Tesone, D., O\u2019Brien, B., Roth, E. 2005. Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts. Proc. Human Factors and Ergonomics Soc. 49th Annual Meeting, pp. 229-233."},{"key":"1_CR5","unstructured":"D\u2019Amico A., Goodall, G.R. 2007. Visual discovery in computer network defense. IEEE Computer Graphics and Applications, 20-27."},{"key":"1_CR6","volume-title":"Thought and Choice in Chess","author":"AD Groot de","year":"1978","unstructured":"de Groot, A. D. 1978. Thought and Choice in Chess. The Hague: Mouton"},{"key":"1_CR7","volume-title":"Perception and Memory in Chess: Studies in the Heuristics of the Professional eye","author":"AD Groot de","year":"1996","unstructured":"de Groot, A. D., Gobet, F. 1996. Perception and Memory in Chess: Studies in the Heuristics of the Professional eye. Assen, The Netherlands: Van Gorcum."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1038\/nrn2787","volume":"11","author":"K Friston","year":"2010","unstructured":"Friston, K. 2010. The free-energy principle: a unified brain theory? Nat. Rev. Neuroscience, 11, 127\u2013138.","journal-title":"Nat. Rev. Neuroscience"},{"key":"1_CR9","unstructured":"Jacobson, G. 2011. Mission cyber security situation assessment using impact dependency graphs. 14th Int. Conf. on Information Fusion, Chicago, Il, July 5-8, pp. 253-260."},{"key":"1_CR10","unstructured":"Jajodia, S, Noel, S. 2010. Topological vulnerability analysis. In: S. Jajodia, P. Liu, V. Swarup, C. Wang. (Eds.) Cyber Situational Awareness. Issues and Research. Springer, pp. 139-154."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Helstrom, C.W. 1968. Statistical Theory of Signal Detection. Pergamon, N.Y.","DOI":"10.1016\/B978-0-08-013265-5.50016-1"},{"key":"1_CR12","unstructured":"Kasparov, G. 2007. How Life Imitates Chess. Bloomsbury,"},{"key":"1_CR13","volume-title":"The Ghost in the Machine","author":"A Koestler","year":"1989","unstructured":"Koestler, A. 1989. The Ghost in the Machine. Arkana Books. London, UK."},{"key":"1_CR14","unstructured":"Kott, A. 2013. Towards fundamental science of cyber security. In: R. E. Pino (Ed.) Network Science and Security. Springer, pp. 1-13."},{"key":"1_CR15","unstructured":"Lavigne, V., Gouin, D. 2014. Visual analytics for cyber security and intelligence. J. Defense Modeling and Simulation: Applications, Methodology, Technology, 175-199."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Lebiere, C., Pirolli, P., Thomson, R., Paik, J., Rutledge-Taylor, M., Staszewski, J., Anderson, J. R. 2013. A functional model of sensemaking in a neurocognitive architecture. Computational Intelligence and Neuroscience, Volume 2013, Article ID 921695, http:\/\/dx.doi.org\/10.1155\/2013\/921695 .","DOI":"10.1155\/2013\/921695"},{"key":"1_CR17","unstructured":"Leemis, L.M. 1995. Reliability. Probabilistic models and statistical methods. Prentice Hall, New Jersey."},{"key":"1_CR18","unstructured":"Luria, A.R. 1973. The Working Brain. An Introduction to Neuropsychology. Basic Books, NY."},{"key":"1_CR19","unstructured":"Mancini, L.V., Pietro, R. 2008. Intrusion Detection Systems. Springer, N.Y."},{"key":"1_CR20","unstructured":"McLean, M. 2013. Concurrent learning algorithm and the importance map. In: R. E. Pino (Ed.) Network Science and Security. Springer, pp. 239-250."},{"key":"1_CR21","doi-asserted-by":"publisher","DOI":"10.1075\/aicr.10","volume-title":"Foundations of Understanding","author":"N Newton","year":"1996","unstructured":"Newton, N. 1996. Foundations of Understanding. John Benjamins Publishing, Amsterdam."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Pirolli, P., Russell, D. M. 2011. Introduction to this special issue on sensemaking. Human\u2013Computer Interaction, 26, 1-2, 1-8","DOI":"10.1080\/07370024.2011.556557"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Roy, A., Kim, D. S., Trivedi, K.S. 2010. Cyber security analysis using attack countermeasure trees. CSIIRW\u201910 April 21-23, Oak Ridge, Tennessee, USA.","DOI":"10.1145\/1852666.1852698"},{"issue":"12","key":"1_CR24","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B. 1999. Attack trees. Dr. Dobb\u2019s J. Software Tools, 24, 12, 21-29.","journal-title":"Dr. Dobb\u2019s J. Software Tools"},{"key":"1_CR25","unstructured":"Turing, A. 1936. On computable numbers, with an application to the Entscheidungsproblem, Proc. of the London Math. Society, Series 2, 42, 230\u2013265."},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1037\/0033-295X.84.4.327","volume":"84","author":"A Tversky","year":"1977","unstructured":"Tversky, A. 1977. Features of similarity. Psyc. Rev, 84, 327-352.","journal-title":"Psyc. Rev"},{"key":"1_CR27","unstructured":"Yufik, Y.M. 2014. \u201cI can see what I can do\u201d: Looking at complex tasks through an intelligent looking glass. In preparation."},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.chaos.2013.04.010","volume":"55","author":"YM Yufik","year":"2013","unstructured":"Yufik, Y. M. 2013a. Understanding, consciousness and thermodynamics of cognition. Chaos, Solitons and Fractals, 55, 44-59.","journal-title":"Chaos, Solitons and Fractals"},{"key":"1_CR29","unstructured":"Yufik, Y.M. 2013b. Understanding cyber warfare. In: R. E. Pino (Ed.) Network Science and Security. Springer, pp. 75-92."},{"key":"1_CR30","unstructured":"Yufik, Y.M. 2013c. Towards a theory of understanding and mental modeling. Recent. Advances. Comp. Sci., 250-255."},{"issue":"1","key":"1_CR31","first-page":"1","volume":"6","author":"YM Yufik","year":"2003","unstructured":"Yufik, Y. M. 2003. Transforming data into actionable knowledge in network centric warfare. J. Battlefield Technology, 6, 1, 1-10.","journal-title":"J. Battlefield Technology"},{"key":"1_CR32","unstructured":"Yufik, Y.M., Sheridan, T.B. 2002. Swiss army knife and Ockham\u2019s razor: Modeling and facilitating operator\u2019s comprehension in complex dynamic tasks. IEEE Systems, Man Cybernetics, 32, 2, 185-199."}],"container-title":["Advances in Information Security","Cybersecurity Systems for Human Cognition Augmentation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10374-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T05:31:56Z","timestamp":1565933516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10374-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319103730","9783319103747"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10374-7_1","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2014]]}}}