{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:50:26Z","timestamp":1725702626838},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_42","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T13:57:47Z","timestamp":1348149467000},"page":"277-288","source":"Crossref","is-referenced-by-count":6,"title":["Designing a Cyber Attack Information System for National Situational Awareness"],"prefix":"10.1007","author":[{"given":"Florian","family":"Skopik","sequence":"first","affiliation":[]},{"given":"Zhendong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Bleier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Arbor networks, \n                    \n                      http:\/\/www.arbornetworks.com\/"},{"key":"42_CR2","unstructured":"Internet storm center, \n                    \n                      http:\/\/isc.sans.org\/"},{"key":"42_CR3","unstructured":"Phishtank, \n                    \n                      http:\/\/www.phishtank.com\/"},{"key":"42_CR4","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: USENIX Security Symposium, Washington, DC, USA (August 2010)"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv.\u00a041(3) (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"1","key":"42_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M. Endsley","year":"1995","unstructured":"Endsley, M.: Toward a theory of situation awareness in dynamic systems. Human Factors\u00a037(1), 32\u201364 (1995)","journal-title":"Human Factors"},{"key":"42_CR7","unstructured":"ENISA: Practical guide\/roadmap for a suitable channel for secure communication: secure communicatio with the CERTs & other statkeholders (December 2011)"},{"key":"42_CR8","unstructured":"EU Press Release IP\/07\/453: ICT drives 50% of eu growth, says commission\u2019s annual report on the digital economy (2007)"},{"key":"42_CR9","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. Tech. rep., Symantic Security Response (October 2010)"},{"key":"42_CR10","unstructured":"Fracker, M.: Measures of situation awareness: Review and future directions. Tech. Rep. AL-TR-1991-0128, Wright-Patterson Air Force Base, OH: Armstrong Laboratories (1991)"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Liu, P., Swarup, V., Wang, C.: Cyber Situational Awareness: Issues and Research, 1st edn. Springer Publishing Company, Incorporated (2009)","DOI":"10.1007\/978-1-4419-0140-8"},{"key":"42_CR12","unstructured":"Lewis, J.A.: Selected bibliography for cyber security, \n                    \n                      http:\/\/csis.org\/publication\/selected-bibliography-cyber-security"},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1057\/jos.2010.3","volume":"4","author":"C.M. Macal","year":"2010","unstructured":"Macal, C.M., North, M.J.: Tutorial on agent-based modelling and simulation. Journal of Simulation\u00a04, 151\u2013162 (2010)","journal-title":"Journal of Simulation"},{"issue":"1\u20134","key":"42_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T.T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.J.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials\u00a010(1\u20134), 56\u201376 (2008)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"42_CR15","unstructured":"Ottis, R.: Analysis of the 2007 cyber attacks against estonia from the information warfare perspective. In: Proceedings of the 7th European Conference on Information Warfare, p. 163. Academic Conferences Limited (April 2008)"},{"key":"42_CR16","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1207\/s15327108ijap0101_4","volume":"1","author":"N. Sarter","year":"1991","unstructured":"Sarter, N., Woods, D.: Situation awareness: A critical but ill-defined phenomenon. International Journal of Aviation Psychology\u00a01, 45\u201357 (1991)","journal-title":"International Journal of Aviation Psychology"},{"key":"42_CR17","unstructured":"Smith, P., Hutchison, D., Sterbenz, J.P.G., Sch\u00f6ller, M., Fessi, A., Doerr, C., Lac, C.: D1.5c: Final strategy document for resilient networking. ResumeNet Project Deliverable (August 2011), \n                    \n                      http:\/\/www.resumenet.eu"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Tadda, G., Salerno, J.J., Boulware, D., Hinman, M., Gorton, S.: Realizing situation awareness within a cyber environment. In: Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications, Orlando, FL, USA (April 2006)","DOI":"10.1117\/12.665763"},{"key":"42_CR19","unstructured":"Tikk, E., Kaska, K., R\u00fcnnimeri, K., Kert, M., Talih\u00e4rm, A.M., Vihul, L.: Cyber attacks against georgia: Legal lessons identified (Novermber 2008), \n                    \n                      http:\/\/www.carlisle.army.mil\/dime\/getDoc.cfm?fileID=167"},{"key":"42_CR20","unstructured":"U.S. Homeland Security Cyber Security R&D Center: A roadmap for cybersecurity research (November 2009)"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:57:19Z","timestamp":1620129439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}