{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:15:23Z","timestamp":1764936923327},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611518"},{"type":"electronic","value":"9783319611525"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61152-5_2","type":"book-chapter","created":{"date-parts":[[2017,7,6]],"date-time":"2017-07-06T10:43:15Z","timestamp":1499337795000},"page":"29-46","source":"Crossref","is-referenced-by-count":11,"title":["An Integrated Framework for Cyber Situation Awareness"],"prefix":"10.1007","author":[{"given":"Sushil","family":"Jajodia","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,7]]},"reference":[{"key":"2_CR1","series-title":"Advances in Information Security","first-page":"47","volume-title":"Cyber Defense and Situational Awareness","author":"M Albanese","year":"2014","unstructured":"Albanese, M., Jajodia, S.: Formation of awareness. In: Kott, A., Wang, C., Erbacher, R.F. (eds.) Cyber Defense and Situational Awareness. Advances in Information Security, vol. 62, pp. 47\u201362. Springer, Cham (2014)"},{"key":"2_CR2","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-1-4614-7597-2_3","volume-title":"Network Science and Cybersecurity","author":"M Albanese","year":"2014","unstructured":"Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperl\u00ec, G., Subrahmanian, V.: Recognizing unexplained behavior in network traffic. In: Pino, R.E. (ed.) Network Science and Cybersecurity. Advances in Information Security, vol. 55, pp. 39\u201362. Springer, New York (2014)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Albanese, M., Jajodia, S., Noel, S.: Time-efficient and cost-effective network hardening using attack graphs. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, June 2012","DOI":"10.1109\/DSN.2012.6263942"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-23822-2_23","volume-title":"Computer Security \u2013 ESORICS 2011","author":"M Albanese","year":"2011","unstructured":"Albanese, M., Jajodia, S., Pugliese, A., Subrahmanian, V.S.: Scalable analysis of attack scenarios. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 416\u2013433. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23822-2_23"},{"key":"2_CR5","first-page":"207","volume-title":"Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013)","author":"M Albanese","year":"2013","unstructured":"Albanese, M., Jajodia, S., Singhal, A., Wang, L.: An efficient approach to assessing the risk of zero-day. In: Samarati, P. (ed.) Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp. 207\u2013218. SciTePress, Reykjav\u00edk (2013)"},{"key":"2_CR6","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/978-1-4419-0140-8_7","volume-title":"Cyber Situational Awareness","author":"S Jajodia","year":"2010","unstructured":"Jajodia, S., Noel, S.: Topological vulnerability analysis. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. Advances in Information Security, vol. 46, pp. 139\u2013154. Springer, New York (2010)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J.: Cauldron: mission-centric cyber situational awareness with defense in depth. In: Proceedings of the Military Communications Conference (MILCOM 2011), Baltimore, pp. 1339\u20131344, November 2011","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats: Issues, Approaches, and Challenges, Massive Computing","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches, and Challenges, Massive Computing, vol. 5, pp. 247\u2013266. Springer, New York (2005)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MSP.2008.9","volume":"6","author":"DJ Leversage","year":"2008","unstructured":"Leversage, D.J., Byres, E.J.: Estimating a system\u2019s mean time-to-compromise. IEEE Secur. Priv. 6(1), 52\u201360 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"McHugh, J.: Quality of protection: measuring the unmeasurable? In: Proceedings of the 2nd ACM Workshop on Quality of Protection (QoP 2006), pp. 1\u20132. ACM, Alexandria, October 2006","DOI":"10.1145\/1179494.1179495"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Natrajan, A., Ning, P., Liu, Y., Jajodia, S., Hutchinson, S.E.: NSDMine: automated discovery of network service dependencies. In: Proceedings of the 31st Annual International Conference on Computer Communications (INFOCOM 2012), Orlando, pp. 2507\u20132515, March 2012","DOI":"10.1109\/INFCOM.2012.6195642"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-38004-4_11","volume-title":"Security and Trust Management","author":"N Nazzicari","year":"2013","unstructured":"Nazzicari, N., Almillategui, J., Stavrou, A., Jajodia, S.: Switchwall: automated topology fingerprinting and behavior deviation identification. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 161\u2013176. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38004-4_11"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of the ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004), pp. 109\u2013118. ACM, Fairfax, October 2004","DOI":"10.1145\/1029208.1029225"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-642-15497-3_35","volume-title":"Computer Security \u2013 ESORICS 2010","author":"L Wang","year":"2010","unstructured":"Wang, L., Jajodia, S., Singhal, A., Noel, S.: k-zero day safety: measuring the security risk of networks against unknown attacks. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 573\u2013587. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15497-3_35"},{"issue":"18","key":"2_CR15","doi-asserted-by":"crossref","first-page":"3812","DOI":"10.1016\/j.comcom.2006.06.018","volume":"29","author":"L Wang","year":"2006","unstructured":"Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Comput. Commun. 29(18), 3812\u20133824 (2006)","journal-title":"Comput. Commun."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-11212-1_28","volume-title":"Computer Security - ESORICS 2014","author":"L Wang","year":"2014","unstructured":"Wang, L., Zhang, M., Jajodia, S., Singhal, A., Albanese, M.: Modeling network diversity for evaluating the robustness of networks against zero-day attacks. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 494\u2013511. Springer, Cham (2014). doi: 10.1007\/978-3-319-11212-1_28"}],"container-title":["Lecture Notes in Computer Science","Theory and Models for Cyber Situation Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61152-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T15:52:37Z","timestamp":1569685957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61152-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611518","9783319611525"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61152-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}