{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:40:02Z","timestamp":1748522402688,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_13","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"143-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adjustable Fusion to Support Cyber Security Operators"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois-Xavier","family":"Aguessy","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Bettan","sequence":"additional","affiliation":[]},{"given":"Romuald","family":"Dobigny","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Laudy","sequence":"additional","affiliation":[]},{"given":"Ga\u00eblle","family":"Lortal","sequence":"additional","affiliation":[]},{"given":"David","family":"Faure","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"5","key":"13_CR1","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.comnet.2012.10.022","volume":"57","author":"S Salah","year":"2013","unstructured":"Salah, S., Maci\u00e1-Fern\u00e1ndez, G., D\u00edaz-Verdejo, J.E.: A model-based survey of alert correlation techniques. Comput. Netw. 57(5), 1289\u20131317 (2013)","journal-title":"Comput. Netw."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Zhuang, X., Xiao, D., Liu, X., Zhang, Y.: Applying data fusion in collaborative alerts correlation. In: International Symposium on Computer Science and Computational Technology, ISCSCT 2008, vol. 2, pp. 124\u2013127, IEEE (2008)","DOI":"10.1109\/ISCSCT.2008.38"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Ahmadinejad, S.H., Jalili, S.: Alert correlation using correlation probability estimation and time windows. In: International Conference on Computer Technology and Development, ICCTD 2009, vol. 2, pp. 170\u2013175. IEEE, November 2009","DOI":"10.1109\/ICCTD.2009.22"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Zhaowen, L., Shan, L., Yan, M.: Real-time intrusion alert correlation system based on prerequisites and consequence. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1\u20135. IEEE, September 2010","DOI":"10.1109\/WICOM.2010.5601285"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-21323-6_8","volume-title":"Computational Intelligence in Security for Information Systems","author":"S Roschke","year":"2011","unstructured":"Roschke, S., Cheng, F., Meinel, C.: A new alert correlation algorithm based on attack graph. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 58\u201367. Springer, Heidelberg (2011)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"F Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: LAMBDA: a language to model a database for detection of attacks. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 197\u2013216. Springer, Heidelberg (2000)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Katipally, R., Gasior, W., Cui, X., Yang, L.: Multistage attack detection system for network administrators using data mining. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, p. 51. ACM, April 2010","DOI":"10.1145\/1852666.1852722"},{"key":"13_CR8","unstructured":"OSSIM, AlienVault. http:\/\/communities.alienvault.com\/"},{"key":"13_CR9","unstructured":"OSSEC, Trend Micro. http:\/\/www.ossec.net\/"},{"key":"13_CR10","unstructured":"QRadar. http:\/\/www-03.ibm.com\/software\/products\/en\/category\/security-intelligence"},{"key":"13_CR11","unstructured":"ArcSight ETRM Platform, HP. http:\/\/www.hpenterprisesecurity.com"},{"key":"13_CR12","unstructured":"RSA Envision. http:\/\/www.emc.com\/security\/rsa-critical-incident-response-solution.htm#!solution_description"},{"key":"13_CR13","unstructured":"Splunk. http:\/\/splunk.com"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kelley, D., Moritz, R.: Best practices for building a security operations center. In: Information Systems Security, pp. 27\u201332, January-February 2006","DOI":"10.1201\/1086.1065898X\/45782.14.6.20060101\/91856.6"},{"issue":"12","key":"13_CR15","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, pp. 71\u201379. ACM, January 1998","DOI":"10.1145\/310889.310919"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., Ingols, K.W.: An annotated review of past papers on attack graphs. Project report, no. PR-IA-1, Massachusetts Inst Of Tech, Lexington Lincoln Lab (2005)","DOI":"10.21236\/ADA431826"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: DAG-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"key":"13_CR20","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security, August 2005"},{"key":"13_CR21","unstructured":"Artz, M.L.: Netspa: a network security planning architecture. Doctoral dissertation, Massachusetts Institute of Technology (2002)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Llinas, J., Nagi, R., Hall, D., Lavery, J.: A multi-disciplinary university research initiative in hard and soft information fusion: overview, research strategies and initial results. In: 2010 13th Conference on Information Fusion (FUSION), pp. 1\u20137. IEEE, July 2010","DOI":"10.1109\/ICIF.2010.5712083"},{"key":"13_CR23","unstructured":"Gross, G.A., Nagi, R., Sambhoos, K., Schlegel, D.R., Shapiro, S.C., Tauer, G.: Towards hard soft data fusion: processing architecture and implementation for the joint fusion and analysis of hard and soft intelligence data. In: 2012 15th International Conference on Information Fusion (FUSION), pp. 955\u2013962. IEEE, July 2012"},{"key":"13_CR24","unstructured":"Gross, G.A., Khopkar, S., Nagi, R., Sambhoos, K.: Data association and graph analytical processing of hard and soft intelligence data. In: 2013 16th International Conference on Information Fusion (FUSION), pp. 404\u2013411. IEEE, July 2013"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Laudy, C.: Semantic knowledge representations for soft data fusion. INTECH Open Access Publisher (2011)","DOI":"10.5772\/17762"},{"key":"13_CR26","unstructured":"Fossier, S., Laudy, C., Pichon, F.: Managing uncertainty in conceptual graph-based soft information fusion. In: 2013 16th International Conference on Information Fusion (FUSION), pp. 930\u2013937. IEEE, July 2013"},{"key":"13_CR27","unstructured":"Laudy, C., Deparis, E., Lortal, G., Mattioli, J.: Multi-granular fusion for social data analysis for a decision and intelligence application. In: 2013 16th International Conference on Information Fusion (FUSION), pp. 1849\u20131855. IEEE, July 2013"},{"key":"13_CR28","unstructured":"McKay, B.D.: Practical graph isomorphism. Congressus Numerantium, Department of Computer Science, Vanderbilt University (1981)"},{"issue":"2","key":"13_CR29","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jpdc.2012.10.005","volume":"73","author":"T Plantenga","year":"2013","unstructured":"Plantenga, T.: Inexact subgraph isomorphism in MapReduce. J. Parallel Distrib. Comput. 73(2), 164\u2013175 (2013)","journal-title":"J. Parallel Distrib. Comput."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Wang, G., Butt, A.R., Khan, M., Kumar, V.A., Marathe, M.V.: Sahad: subgraph analysis in massive networks using hadoop. In: 2012 IEEE 26th International Parallel & Distributed Processing Symposium (IPDPS), pp. 390\u2013401. IEEE, May 2012","DOI":"10.1109\/IPDPS.2012.44"},{"key":"13_CR31","volume-title":"Graph-based Knowledge Representation: Computational Foundations of Conceptual Graphs","author":"M Chein","year":"2008","unstructured":"Chein, M., Mugnier, M.L.: Graph-based Knowledge Representation: Computational Foundations of Conceptual Graphs. Springer Science & Business Media, London (2008)"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"McKenna, S., Mazur, D., Agutter, J., Meyer, M.: Design activity framework for visualization design. In: Proceedings of the IEEE VIS Conference, Paris (2014)","DOI":"10.1109\/TVCG.2014.2346331"},{"key":"13_CR33","unstructured":"Montferrat, P., Lortal, G., Faure, D., Coppin, G.: Intention de transfert de responsabilit\u00e9 pour le travail coop\u00e9ratif. In: Association pour la Recherche Cognitive (ARCo 2009), Rouen, France, D\u00e9cembre (2009)"},{"key":"13_CR34","unstructured":"Montferrat, P., Faure, D., Lortal, G.: The 'Responsibility Cube' in maritime surveillance domain. In: Proceedings of COGIS \u2013 Cognitive Systems with Interactive Sensors- (SEE, IET eds.), 6 pages (2009). ISBN: 2-912328-55-1"},{"key":"13_CR35","doi-asserted-by":"crossref","DOI":"10.21236\/ADA057655","volume-title":"Human and Computer Control of Undersea Teleoperators","author":"TB Sheridan","year":"1978","unstructured":"Sheridan, T.B., Verplank, W.: Human and Computer Control of Undersea Teleoperators. Man-Machine Systems Laboratory, Department of Mechanical Engineering, MIT, Cambridge, MA (1978)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:24:29Z","timestamp":1748521469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}