{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T11:27:36Z","timestamp":1747135656149},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611518"},{"type":"electronic","value":"9783319611525"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61152-5_1","type":"book-chapter","created":{"date-parts":[[2017,7,6]],"date-time":"2017-07-06T10:43:15Z","timestamp":1499337795000},"page":"3-25","source":"Crossref","is-referenced-by-count":8,"title":["Computer-Aided Human Centric Cyber Situation Awareness"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Nancy","family":"Cooke","sequence":"additional","affiliation":[]},{"given":"Gonz\u00e1lez","family":"Coty","sequence":"additional","affiliation":[]},{"given":"David","family":"Hall","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Healey","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Michael D.","family":"McNeese","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Reeves","sequence":"additional","affiliation":[]},{"given":"V. S.","family":"Subrahmanian","sequence":"additional","affiliation":[]},{"given":"Cliff","family":"Wang","sequence":"additional","affiliation":[]},{"given":"John","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Albanese, M., Cam, H., Jajodia, S.: Automated cyber situation awareness tools for improving analyst performance. In: Pino, R.E., Kott, A., Shevenell, M. (eds.) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol. 61, pp. 47\u201360. Springer, Cham (2014)","key":"1_CR1","DOI":"10.1007\/978-3-319-10374-7_3"},{"doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., Noel, S.: Time-efficient and cost-effective network hardening using attack graphs. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 25\u201328 June, Boston, Massachusetts, USA (2012)","key":"1_CR2","DOI":"10.1109\/DSN.2012.6263942"},{"doi-asserted-by":"crossref","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., Subrahmanian, V.S.: Finding unexplained activities in video. In: Proceedings of 2011 International Joint Conference on Artificial Intelligence, accepted for both a talk and poster presentation, Barcelona, July 2011","key":"1_CR3","DOI":"10.21236\/ADA587505"},{"issue":"3","key":"1_CR4","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TKDE.2013.33","volume":"26","author":"M Albanese","year":"2014","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., Subrahmanian, V.S.: Discovering the top-k unexplained sequences in time-stamped observation data. IEEE Trans. Knowl. Data Eng. 26(3), 577\u2013594 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Chen, P.-C., Liu, P., Yen, J., Mullen, T.: Experience-based cyber situation recognition using relaxable logic patterns. In: The 2nd IEEE International Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2012), New Orleans, LA, 6\u20138 March 2012 (2012)","key":"1_CR5","DOI":"10.1109\/CogSIMA.2012.6188392"},{"issue":"3","key":"1_CR6","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1177\/0018720812464045","volume":"55","author":"V Dutt","year":"2013","unstructured":"Dutt, V., Ahn, Y., Gonzalez, C.: Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory. Hum. Factors 55(3), 605\u2013618 (2013)","journal-title":"Hum. Factors"},{"doi-asserted-by":"crossref","unstructured":"Dai, J., Sun, X., Liu, P., Giacobe, N.: Gaining big picture awareness through an interconnected cross-layer situation knowledge reference model. In: ASE International Conference on Cyber Security, Washington DC, 14\u201316 December (2012)","key":"1_CR7","DOI":"10.1109\/CyberSecurity.2012.18"},{"key":"1_CR8","volume-title":"The Mind\u2019s New Science: A History of the Cognitive Revolution","author":"H Gardner","year":"1987","unstructured":"Gardner, H.: The Mind\u2019s New Science: A History of the Cognitive Revolution. Basic Books, New York (1987)"},{"doi-asserted-by":"crossref","unstructured":"Giacobe, N.A., McNeese, M.D., Mancuso, V.F., Minotra, D.: Capturing human cognition in cyber-security simulations with NETS. In: 2013 IEEE International Conference on Intelligence and Security Informatics (ISI), 4\u20137 June 2013, pp. 284\u2013288 (2013)","key":"1_CR9","DOI":"10.1109\/ISI.2013.6578844"},{"key":"1_CR10","series-title":"Advances in Information Security","first-page":"145","volume-title":"Cyber Defense and Situational Awareness","author":"CG Healey","year":"2016","unstructured":"Healey, C.G., Hao, L., Hutchinson, S.E.: Visualizations and analysts. In: Erbacher, R., Kott, A., Wang, C. (eds.) Cyber Defense and Situational Awareness. Advances in Information Security, vol. 62, pp. 145\u2013165. Springer, Cham (2016)"},{"key":"1_CR11","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","volume":"52","author":"SG Hart","year":"1988","unstructured":"Hart, S.G., Staveland, L.E.: Development of NASA-TLX (Task Load Index): results of empirical and theoretical research. Adv. Psychol. 52, 139\u2013183 (1988)","journal-title":"Adv. Psychol."},{"doi-asserted-by":"crossref","unstructured":"Jariwala, S., Champion, M., Rajivan, P., Cooke, N.J.: Influence of team communication and coordination on the performance of teams at the iCTF competition. In: Proceedings of the 56th Annual Conference of the Human Factors and Ergonomics Society, Human Factors and Ergonomics Society, Santa Monica (2012)","key":"1_CR12","DOI":"10.1177\/1071181312561044"},{"doi-asserted-by":"crossref","unstructured":"Jariwala, S., Champion, M., Rajivan, P., Cooke, N.J.: Influence of team communication and coordination on the performance of teams at the iCTF competition. In: Proceedings of the 56th Annual Conference of the Human Factors and Ergonomics Society, Human Factors and Ergonomics Society, Santa Monica (2016)","key":"1_CR13","DOI":"10.1177\/1071181312561044"},{"doi-asserted-by":"crossref","unstructured":"Zhao, M., Grossklags, J., Liu, P.: An empirical study of web vulnerability discovery ecosystems. In: ACM CCS (2015)","key":"1_CR14","DOI":"10.1145\/2810103.2813704"},{"key":"1_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2633685","volume":"14","author":"C Molinaro","year":"2014","unstructured":"Molinaro, C., Moscato, V., Picariello, A., Pugliese, A., Rullo, A., Subrahmanian, V.S.: PADUA: a parallel architecture to detect unexplained activities. ACM Trans. Internet Technol. 14, 3 (2014)","journal-title":"ACM Trans. Internet Technol."},{"doi-asserted-by":"crossref","unstructured":"Natrajan, A., Ning, P., Liu, Y., Jajodia, S., Hutchinson, S.E.: NSDMine: automated discovery of network service dependencies. In: Proceedings of the 31st Annual International Conference on Computer Communications (INFOCOM 2012), 25\u201330 March 2012, Orlando, Florida (2012)","key":"1_CR16","DOI":"10.1109\/INFCOM.2012.6195642"},{"unstructured":"Peddycord III, B., Ning, P., Jajodia, S.: On the accurate identification of network service dependencies in distributed systems. In: Proceedings of the USENIX 26th Large Installation System Administration Conference (LISA 2012), San Diego, CA, 9\u201314 December (2012)","key":"1_CR17"},{"doi-asserted-by":"crossref","unstructured":"Rimland, J., Ballora, M.: Using complex event processing (CEP) and vocal synthesis techniques to improve comprehension of sonified human-centric data. In: Proceedings of the SPIE Conference on Sensing Technology and Applications, vol. 9122, June 2014","key":"1_CR18","DOI":"10.1117\/12.2050344"},{"unstructured":"Rajivan, P., Cooke, N.J.: A methodology for research on the cognitive science of cyber defense. J. Cognit. Eng. Decis. Making Special Issue on Cybersecurity Decision Making (2016)","key":"1_CR19"},{"unstructured":"Rajivan, P., Shankaranarayanan, V., Cooke, N.J.: CyberCog: a synthetic task environment for studies of cyber situation awareness. In: Presentation and Proceedings of 10th\u00a0International Conference on\u00a0Naturalistic Decision Making (NDM), May 31-June 3, Orlando, FL (2011)","key":"1_CR20"},{"doi-asserted-by":"crossref","unstructured":"Serra, E., Jajodia, S., Pugliese, A., Rullo, A., Subrahmanian, V.S.: Pareto-optimal adversarial defense of enterprise systems. ACM Trans. Inf. Syst. Secur. 17(3) (2015)","key":"1_CR21","DOI":"10.1145\/2699907"},{"doi-asserted-by":"crossref","unstructured":"Scielzo, S., Strater, L.D., Tinsley, M.L., Ungvarsky, D.M., Endsley, M.R.: Developing a subjective shared situation awareness inventory for teams. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 53, no. 4, pp. 289\u2013293. SAGE Publications, Los Angeles (2009)","key":"1_CR22","DOI":"10.1177\/154193120905300427"},{"unstructured":"Taylor, R.M.: Situational awareness rating technique (SART): the development of a tool for aircrew systems design. In: Situational Awareness in Aerospace Operations (AGARD-CP-478), pp. 3\/1\u20133\/17, Neuilly Sur Seine, NATO \u2013 AGARD, France (1990)","key":"1_CR23"},{"key":"1_CR24","series-title":"Advances in Information Security","first-page":"15","volume-title":"Cyber Situational Awareness","author":"GP Tadda","year":"2009","unstructured":"Tadda, G.P., Salerno, J.S.: Overview of cyber situation awareness. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. Advances in Information Security, vol. 46, pp. 15\u201335. Springer, Heidelberg (2009)"},{"unstructured":"Wang, R., Ning, P., Xie, T., Chen, Q.: MetaSymploit: day-one defense against script-bases attacks with security-enhanced symbolic analysis. In: Proceedings of 22nd USENIX Security Symposium (Security 2013), August 2013","key":"1_CR25"},{"unstructured":"Xie, P., Li, J.H., Ou, X., Liu, P., Levy, R.: Using bayesian networks for cyber security analysis. In: Proceedings of IEEE DSN-DCCS (2010)","key":"1_CR26"},{"doi-asserted-by":"crossref","unstructured":"Zhong, C., Kirubakaran, D.S., Yen, J., Liu, P., Hutchinson, S., Cam, H.: How to use experience in cyber analysis: an analytical reasoning support system. In: Proceedings of IEEE Conference on Intelligence and Security Informatics (ISI) (2013)","key":"1_CR27","DOI":"10.1109\/ISI.2013.6578832"},{"doi-asserted-by":"crossref","unstructured":"Zhong, C., Samuel, D., Yen, J., Liu, P., Erbacher, R., Hutchinson, S., Etoty, R., Cam, H., Glodek, W.: RankAOH: context-driven similarity-based retrieval of experiences in cyber analysis. In: Proceedings of IEEE CogSIMA Conference (2014)","key":"1_CR28","DOI":"10.1109\/CogSIMA.2014.6816567"},{"doi-asserted-by":"crossref","unstructured":"Zhong, C., et al.: Studying analysts data triage operations in cyber defense situational analysis. In: Liu, P., Jajodia, S., Wang, C. (eds) Theory and Models for Cyber Situation Awareness. LNCS, vol. 10030, pp. 128\u2013169. Springer, Cham (2017)","key":"1_CR29","DOI":"10.1007\/978-3-319-61152-5_6"}],"container-title":["Lecture Notes in Computer Science","Theory and Models for Cyber Situation Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61152-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T15:52:49Z","timestamp":1569685969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61152-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611518","9783319611525"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61152-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}