{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:09:07Z","timestamp":1742969347928,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319113906"},{"type":"electronic","value":"9783319113913"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11391-3_7","type":"book-chapter","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T09:22:10Z","timestamp":1420449730000},"page":"119-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cognitive Process"],"prefix":"10.1007","author":[{"given":"John","family":"Yen","sequence":"first","affiliation":[]},{"given":"Robert F.","family":"Erbacher","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,2]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A Aamodt","year":"1994","unstructured":"Aamodt, A. and Plaza, E. (1994) \u201cCase-based reasoning: foundational issues, methodological variations, and system approaches.\u201d AI Commun. 7, 1, 39\u201359.","journal-title":"AI Commun."},{"key":"7_CR2","volume-title":"Knowledge elicitation: Principles, Techniques, and Applications","author":"J Bell","year":"1989","unstructured":"Bell, J., and Hardiman, R. J. (1989) \u201cThe third role \u2013 the naturalistic knowledge engineer\u201d, in Knowledge elicitation: Principles, Techniques, and Applications, Dan Diaper (ed.), John Wiley & Sons, New York."},{"key":"7_CR3","unstructured":"Biros, D., and Eppich, T. (2001) Human Element Key to Intrustion Detection, Signal, p. 31, August."},{"key":"7_CR4","first-page":"243","volume-title":"SDM","author":"S Boriah","year":"2008","unstructured":"Boriah, S., Chandola, V., Kumar, V.: (2008) Similarity measures for categorical data: A comparative evaluation. In: SDM, pp. 243\u2013254. SIAM, Philadelphia."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Crandall, B., Klein, G., and Hoffman, R. (2006). Working minds: A practitioner's guide to cognitive task analysis. MIT Press.","DOI":"10.7551\/mitpress\/7304.001.0001"},{"key":"7_CR6","unstructured":"Cunningham, P., (2008) \u201cA Taxonomy of Similarity Mechanisms for Case-Based Reasoning,\u201d University College Dublin, Technical Report UCD-CSI-20080-11, January 6."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"D\u2019Amico, A., Whitley, K., Tesone, D., O\u2019Brien, B., and Roth, E., (2005) Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts, in Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, 229\u2013233.","DOI":"10.1177\/154193120504900304"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"D\u2019Amico, A. and Whitley, K. (2008) \u201cThe Real Work of Computer Network Defense Analysts,\u201d VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, Springer-Verlag Berlin Heidelberg, pp. 19\u201337.","DOI":"10.1007\/978-3-540-78243-8_2"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"De Mantaras, R. L., McSherry, D., Bridge, D., Leake, D., Smyth, B., Craw, S., Faltings, B., Maher, M. L., Cox, M. T., Forbus, K., Keane, M., Aamodt, A., and Watson, I. (2005) Retrieval, reuse, revision and retention in case-based reasoning. Knowl. Eng. Rev. 20, 3 (September 2005), 215\u2013240.","DOI":"10.1017\/S0269888906000646"},{"key":"7_CR10","unstructured":"Doyle, D. (2005) \u201cA Knowledge-Light Mechanism for Explanation in Case-Based Reasoning,\u201d University of Dublin, Trinity College. Department of Computer Science, Doctoral Thesis TCD-CS-2005-71."},{"key":"7_CR11","volume-title":"Expert Systems: Design and Development\u201d","author":"J Durkin","year":"1994","unstructured":"Durkin, J. (1994), \u201cExpert Systems: Design and Development\u201d, Mamillan, New York, NY."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Erbacher, R. F. and Hutchinson, S. E. (2012) \u201cExtending Case-based Reasoning to Network Alert Reporting\u201d, in Proceedings of 2012 International Conference on Cyber Security, pp. 187\u2013194.","DOI":"10.1109\/CyberSecurity.2012.31"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1057\/ivs.2010.5","volume":"9","author":"RF Erbacher","year":"2010","unstructured":"Erbacher, R. F., Frincke, D. A., Wong, P. C.,Moody, S. J., Fink, G. A. (2010a) A multi-phase network situational awareness cognitive task analysis, Information Visualization 9(3): 204\u2013219.","journal-title":"Information Visualization"},{"key":"7_CR14","first-page":"75300","volume":"2010","author":"RF Erbacher","year":"2010","unstructured":"Erbacher, R. F., Frincke, D. A., Wong, P. C.,Moody, S. J., Fink, G. A, (2010b) Cognitive task analysis of network analysts and managers for network situational awareness. VDA 2010: 75300","journal-title":"VDA"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1037\/0033-295X.87.3.215","volume":"87","author":"KA Ericsson","year":"1980","unstructured":"Ericsson, K. A. and Simon, H. A., (1980) \u201cVerbal reports as data\u201d, Psychological Review, 87 (3), pp. 215\u2013251.","journal-title":"Psychological Review"},{"key":"7_CR16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5657.001.0001","volume-title":"Protocol analysis","author":"KA Ericsson","year":"1993","unstructured":"Ericsson, K. A. and Simon, H. A., (1993) \u201cProtocol analysis\u201d, MIT Press, Cambridge, MA."},{"key":"7_CR17","unstructured":"Foresti, S. and Agutter, J., \u201cCognitive Task Analysis Report,\u201d University of Utah, CROMDI. Funded by ARDA and DOD."},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1207\/s15516709cog0704_2","volume":"7","author":"J Kolodner","year":"1983","unstructured":"Kolodner, J. (1983) \u201cReconstructive Memory: A Computer Model,\u201d Cognitive Science 7 (4), pp. 281\u2013328.","journal-title":"Cognitive Science"},{"issue":"4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/S0004-3702(83)80019-8","volume":"21","author":"M Lebowitz","year":"1983","unstructured":"Lebowitz, M. (1983) \u201cMemory-based parsing,\u201d Artificial Intelligence 21, 4, pp. 363\u2013404.","journal-title":"Artificial Intelligence"},{"key":"7_CR20","unstructured":"Long, J., Stoecklin, S., Schwartz, D. G., and Patel, M., (2004) \u201cAdaptive Similarity Metrics in Case-based Reasoning,\u201d The 6th IASTED International Conference on Intelligent Systems and Control (ISC 2004), August 23\u201325, Honolulu, Hawaii, pp. 260\u2013265."},{"key":"7_CR21","unstructured":"Osborne, H. and Bridge, D., (1997) \u201cModels of Similarity for Case-Based Reasoning,\u201d Proc. Interdisciplinary Workshop Similarity and Categorisation, pp. 173\u2013179."},{"key":"7_CR22","unstructured":"Ranganathan A., and Ronen, R. (2010) \u201cInformation-Theory Based Measure of Similarity Between Instances in Ontology,\u201d International Business Machines Corporation, United States Patent #7,792,838 B2."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Sanderson, P., Scott, J., Johnston, T., Mainzer, J., Watanabe, L., and James, J., (1994) \u201cMacSHAPA and the enterprise of exploratory sequential data analysis (ESDA)\u201d, Int. J. Human-Computer Studies, 41, pp. 633\u2013681.","DOI":"10.1006\/ijhc.1994.1077"},{"key":"7_CR24","unstructured":"Schank, R., (1982) Dynamic Memory: A Theory of Learning in Computers and People (New York: Cambridge University Press."},{"issue":"1","key":"7_CR25","first-page":"27","volume":"18","author":"LK Soh","year":"2008","unstructured":"Soh, L. K., and Blank, T. (2008) \u201cIntegrating Case-Based Reasoning and Meta-Learning for a Self-Improving Intelligent Tutoring System. Int. J. Artif. Intell. Ed. 18, 1, 27\u201358.","journal-title":"Int. J. Artif. Intell. Ed."},{"key":"7_CR26","unstructured":"Stahl, A. (2004) Learning of Knowledge-Intensive Similarity Measures in Case-Based Reasoning. PHD-Thesis, dissertation.de, Technische Universit\u00e4t Kaiserslautern."},{"key":"7_CR27","unstructured":"Sterling, W. M., and Ericson, B. J. (2006) \u201cCase-Based Reasoning Similarity Metrics Implementation Using User Defined Functions,\u201d NCR Corp., United States Patent # 7,136,852 B1, Nov. 14."},{"issue":"9","key":"7_CR28","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1002\/int.20101","volume":"20","author":"Z Sun","year":"2005","unstructured":"Sun, Z., Finnie, G., and Weber, K. (2005) \u201cAbductive Case Based Reasoning,\u201d International Journal of Intelligent Systems, 20(9), 957\u2013983.","journal-title":"International Journal of Intelligent Systems"},{"key":"7_CR29","unstructured":"Wang, H. and Dubitzky, W., (2005) \u201cA flexible and robust similarity measure based on contextual probability.\u201d In Proceedings of the 19th international joint conference on Artificial intelligence (IJCAI'05). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 27\u201332."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Zhong, C., Kirubakaran, D. S., Yen, J. and Liu, P., (2013) \u201cHow to Use Experience in Cyber Analysis: An Analyt-ical Reasoning Support System,\u201d in Proc. of IEEE Conf. on Intelligence and Security Informatics (ISI), pp. 263\u2013265.","DOI":"10.1109\/ISI.2013.6578832"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Zhong, C., Samuel, D., Yen, J., Liu, P., Erbacher, R., Hutchinson, S., Etoty, R., Cam, H., and Glodek, W. (2014) \u201cRankAOH: Context-driven Similarity-based Retrieval of Experiences in Cyber Analysis,\u201d in Proceedings of IEEE International Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2014) pp. 230\u2013236.","DOI":"10.1109\/CogSIMA.2014.6816567"},{"key":"7_CR32","unstructured":"VAST Challenge 2012 http:\/\/www.vacommunity.org\/VAST+Challenge+2012"}],"container-title":["Advances in Information Security","Cyber Defense and Situational Awareness"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11391-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T17:37:22Z","timestamp":1674841042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11391-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113906","9783319113913"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11391-3_7","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"2 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}