{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:43:39Z","timestamp":1774907019301,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319113906","type":"print"},{"value":"9783319113913","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11391-3_4","type":"book-chapter","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T09:22:10Z","timestamp":1420449730000},"page":"47-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Formation of Awareness"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., Pugliese, A., and Subrahmanian, V. S. \u201cScalable Analysis of Attack Scenarios\u201d. In Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pages 416-433, Leuven, Belgium, September 12-14, 2011.","DOI":"10.1007\/978-3-642-23822-2_23"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., and Noel, S. \u201cTime-Efficient and Cost-Effective Network Hardening Using Attack Graphs\u201d. In Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, Massachusetts, USA, June 25-28, 2012","DOI":"10.1109\/DSN.2012.6263942"},{"key":"4_CR3","unstructured":"Albanese, M., Jajodia, S., Singhal, A., and Wang, L. \u201cAn Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities\u201d. In Proceedings of the 10th International Conference on Security and Cryptography, Reykjav\u00edk, Iceland, July 29-31, 2013. Best paper award"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Albanese, M., Pugliese, A., and Subrahmanian, V. S. \u201cFast Activity Detection: Indexing for Temporal Stochastic Automaton based Activity Models\u201d. In IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 2, pages 360-373, February 2013.","DOI":"10.1109\/TKDE.2011.246"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., and Subrahmanian, V. S. \u201cDiscovering the Top-k \"Unexplained\" Sequences in Time-Stamped Observation Data\u201d. IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 3, pages 577-594, March 2014.","DOI":"10.1109\/TKDE.2013.33"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., and Kaushik, S. \u201cScalable, graph-based network vulnerability analysis,\u201d in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 217\u2013224, Washington, DC, USA, November 2002.","DOI":"10.1145\/586110.586140"},{"key":"4_CR8","unstructured":"Cloud Security Alliance (CSA). \u201cCloud Controls Matrix Version 3.0\u201d, https:\/\/cloudsecurityalliance.org\/research\/ccm\/"},{"key":"4_CR9","unstructured":"Cousins, D., Partridge, C., Bongiovanni, K., Jackson, A. W., Krishnan, R., Saxena, T., and Strayer, W. T. \u201cUnderstanding Encrypted Networks Through Signal and Systems Analysis of Traffic Timing\u201d, 2003."},{"key":"4_CR11","unstructured":"Gardner, H. \u201cThe Mind\u2019s New Science: A History of the Cognitive Revolution\u201d, Basic Books, 1987."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Liu, P., Swarup, V., and Wang, C. (Eds.) \u201cCyber Situational Awareness: Issues and Research\u201d , Vol. 46 of Advances in Information Security, Springer, 2010.","DOI":"10.1007\/978-1-4419-0140-8"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M., and Williams, J. \u201cCauldron: Mission-Centric Cyber Situational Awareness with Defense in Depth\u201d. In Proceedings of the Military Communications Conference (MILCOM 2011), Baltimore, Maryland, USA, November 7-10, 2011.","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"4_CR14","unstructured":"Johnson-Laird, P. \u201cHow We Reason\u201d, Oxford University Press, 2006."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Leversage, D. J., Byres, E. J. \u201cEstimating a System's Mean Time-to-Compromise,\u201d IEEE Security & Privacy, vol. 6, no. 1, pp. 52-60, January-February 2008.","DOI":"10.1109\/MSP.2008.9"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Mandiant, \u201cAPT1: Exposing One of China\u2019s Cyber Espionage Units\u201d, 2013","DOI":"10.1201\/b16112-2"},{"key":"4_CR17","unstructured":"MITRE. \u201cCommon Vulnerabilities and Exposures (CVE)\u201d, http:\/\/cve.mitre.org\/."},{"key":"4_CR18","unstructured":"NIST. \u201cNational Vulnerability Database (NVD)\u201d, http:\/\/nvd.nist.gov\/."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"NIST. \u201cGuide for Applying the Risk Management Framework to Federal Information Systems\u201d, Special Publication 800-37, Revision 1, http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-37r1, February 2010.","DOI":"10.6028\/NIST.SP.800-37r1"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"NIST. \u201cSecurity and Privacy Controls for Federal Information Systems and Organizations\u201d, Special Publication 800-53, Revision 4, http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-53r4, April 2013.","DOI":"10.6028\/NIST.SP.800-53r4"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Partridge, C., Cousins, D., Jackson, A.W., Krishnan, R., Saxena, T., and Strayer, W. T. \u201cUsing signal processing to analyze wireless data traffic\u201d, In Proceedings of the 1st ACM workshop on Wireless Security (WiSE 2002), ACM, pages 67-76, 2002.","DOI":"10.1145\/570681.570689"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Phillips, C., and Swiler, L. P. \u201cA graph-based system for network-vulnerability analysis,\u201d in Proceedings of the New Security Paradigms Workshop (NSPW 1998), pp. 71\u201379, Charlottesville, VA, USA, September 1998.","DOI":"10.1145\/310889.310919"},{"key":"4_CR23","unstructured":"Symantec Corporation. \u201cInternet Security Threat Report 2014\u201d, Volume 19, April 2014."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Wang, L., Liu, A., and Jajodia, S. \u201cUsing attack graphs for correlating, hypothesizing, and predicting intrusion alerts,\u201d Computer Communications, vol. 29, no. 15, pp. 2917\u20132933, September 2006.","DOI":"10.1016\/j.comcom.2006.04.001"}],"container-title":["Advances in Information Security","Cyber Defense and Situational Awareness"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11391-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T12:48:44Z","timestamp":1675255724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11391-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113906","9783319113913"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11391-3_4","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"2 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}