{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:27:51Z","timestamp":1761974871300,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380327"},{"type":"electronic","value":"9783642380334"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38033-4_3","type":"book-chapter","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T00:51:00Z","timestamp":1367887860000},"page":"31-43","source":"Crossref","is-referenced-by-count":4,"title":["Situational Awareness for Improving Network Resilience Management"],"prefix":"10.1007","author":[{"given":"Mixia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Madni, A.M., Jackson, S.: Towards a conceptual framework for resilience engineering. IEEE Systems Journal\u00a03(2) (2009)","DOI":"10.1109\/JSYST.2009.2017397"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","volume":"54","author":"J.P.G. Sterbenz","year":"2010","unstructured":"Sterbenz, J.P.G., Hutchison, D., Cetinkaya, E.K., et al.: Resilience and Survivability in Communication Network: Strategies, Principles, and Survey and Disciplines. Computer Networks\u00a054, 1245\u20131265 (2010)","journal-title":"Computer Networks"},{"key":"3_CR3","unstructured":"Smith, P., Scholler, M., Fessi, A., et al.: Network Resilience: A Systematic Approach. Submitted to IEEE Communication (December 2010)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/12.45203","volume":"39","author":"W. Najjar","year":"1990","unstructured":"Najjar, W., Gaudiot, J.: Network resilience: A measure of fault tolerance. IEEE Trans. Comput.\u00a039(2), 174\u2013181 (1990)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Joseph, D., Franks, J.K., Freeman, C.N., et al.: Reliable and Resilient End-to-End Connectivity for Heterogeneous Networks. US 2011\/0038256 A1 (2011)","DOI":"10.1109\/AFRCON.2011.6072152"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Cholda, P., Mykkltveit, A., et al.: A survey of resilience differentiation frameworks in communication network. IEEE Communications Surveys & Tutorials\u00a09(4) (2007)","DOI":"10.1109\/COMST.2007.4444749"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Menth, M., Duelli, M., Martin, R., Milbrandt, J.: Resilience analysis of packet-witched communication networks. IEEE\/ACM Transactions on Networking (2009)","DOI":"10.1109\/TNET.2009.2020981"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Keralapura, R., Moerschell, A., Chuah, C.N., et al.: A Case for Using Service Availability to Characterize IP Backbone Topologies. Journal of Communications and Networks\u00a08(2) (2006)","DOI":"10.1109\/JCN.2006.6182754"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Haider, A., Harris, R.: Recovery Techniques in Next Generation Networks. IEEE Communications Surveys & Tutorials\u00a09(3) (2007)","DOI":"10.1109\/COMST.2007.4317617"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Sousa, B., Pentikousis, K., Curado, M.: REF: Resilience Evaluation Framework. In: 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (2010)","DOI":"10.1109\/ICUMT.2010.5676560"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Schaeffer-Filho, A., Smith, P., Mauthe, A., Hutchison, D., Yu, Y., Fry, M.: A Framework for the Design and Evaluation of Network Resilience Management. In: 13th IEEE\/IFIP Network Operations and Management Symposium (2012)","DOI":"10.1109\/NOMS.2012.6211924"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Cholda, P., Tapolcai, J., Cinkler, T., et al.: Quality of Resilience as a Network Reliability Characterization Tool. IEEE Network (2009)","DOI":"10.1109\/MNET.2009.4804331"},{"key":"3_CR13","unstructured":"Autenrieth, A.: Differentiated Resilience in IP-Based Multilayer Transport Networks. Ph.D. dissertation. Technische University Munchen, Munchen (2003)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-76929-3_20","volume-title":"Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security","author":"E. Bursztein","year":"2007","unstructured":"Bursztein, E., Goubault-Larrecq, J.: A Logical Framework for Evaluating Network Resilience against Faults and Attacks. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol.\u00a04846, pp. 212\u2013227. Springer, Heidelberg (2007)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Sterbenz, J.P.G., Cetinkaya, E.K., Hameed, M.A., et al.: Evaluation of, Network Resilience, Survivability and Disruption Tolerance: Analysis, Topology Generation, Simulation and Experimentation. Springer Telecommunication Systems Journal (2011)","DOI":"10.1007\/s11235-011-9573-6"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Dove, R.: Patterns of Self-Organizing Agile Security for Resilient Network Situational Awareness and Sensemaking. In: 8th International Conference on Information Technology: New Generations (ITNG) (2011)","DOI":"10.1109\/ITNG.2011.156"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Mayron, L.M., Bahr, G.S., et al.: A Hybrid Cognitive- Neurophysiological Approach to Resilient Cyber Security. In: The 2010 Militay Communicatons Conference \u2013 Cyber Security and Network Management (2010)","DOI":"10.1109\/MILCOM.2010.5679585"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M.R. Endsley","year":"1995","unstructured":"Endsley, M.R.: Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors Journal\u00a037(1), 32\u201364 (1995)","journal-title":"Human Factors Journal"},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"T. Bass","year":"2000","unstructured":"Bass, T.: Intrusion systems and multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM\u00a043(4), 99\u2013105 (2000)","journal-title":"Communications of the ACM"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Chen, G., Shen, D., et al.: Game Theoretic Approach to Threat Prediction and Situation Awareness. Journal of Advances in Information Fusion\u00a02(1) (2007)","DOI":"10.1109\/ICIF.2006.301670"},{"key":"3_CR21","unstructured":"Liu, M., Hutchison, D.: Towards Resilient Networks Using Situation Awareness. In: The 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (2011)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Schaeffer-Filho, A., Smith, P., Mauthe, A.: Policy-driven Network Simulation: a Resilience Case Study. In: SAC 2011, March 21-25 (2011)","DOI":"10.1145\/1982185.1982293"},{"key":"3_CR23","unstructured":"Zhai, Y., Ning, P., Iyer, P., et al.: Reasoning About Complementary Intrusion Evidence. In: Proceedings of 20th Annual Computer Security Applications Conference (2004)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Steinder, M., Sethi, A.S.: Probabilistic Fault Localization in Communication Systems Using Belief Networks. IEEE\/ACM Transactions on Networking\u00a012(5) (2004)","DOI":"10.1109\/TNET.2004.836121"},{"key":"3_CR25","unstructured":"Michael, F., Mathias, F., Paul, S., David, H.: Challenge Identification for Network Resilience. In: 2010 6th EURO-NF Conference on Next Generation Internet (NGI) (2010)"},{"key":"3_CR26","unstructured":"Moitra, S.D., Konda, S.L.: The Survivability of Network Systems: An Empirical Analysis. CMU\/SEI-2000-TR-021 (2000)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Sterbenz, J.P.G., Cetinkaya, E.K., Hameed, M.A., et al.: Evaluation of Network Resilience, Survivability and Disruption Tolerance: Analysis, Topology Generation, Simulation and Experimentation. Springer Telecommunication Systems Journal (2011)","DOI":"10.1007\/s11235-011-9573-6"},{"key":"3_CR28","unstructured":"Lin, C., Wang, Y., Wang, Y.: A Stochastic Game Nets Based Approach for Network Security Analysis. In: Proc. of the 29th International Conference on Application and Theory of Petri Nets and other Models of Concurrency, Concurrency Methods: Issues and Applications 2008 Workshop (2008) (invited paper)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Zakrzewska, A.N., Ferragut, E.M.: Modeling Cyber Conflicts Using an Extended Petri Net Formalism. In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) (2011)","DOI":"10.1109\/CICYBS.2011.5949385"},{"key":"3_CR30","unstructured":"Imperial College DoC MSc Group And MSc Individual Project, http:\/\/pipe2.sourceforge.net\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38033-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:48:30Z","timestamp":1746002910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38033-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380327","9783642380334"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38033-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}