{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:52Z","timestamp":1740099472223,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811383106"},{"type":"electronic","value":"9789811383113"}],"license":[{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-13-8311-3_29","type":"book-chapter","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T15:02:34Z","timestamp":1563289354000},"page":"335-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Decision Support for Network Path Estimation via Automated Reasoning"],"prefix":"10.1007","author":[{"given":"Dean","family":"Philp","sequence":"first","affiliation":[]},{"given":"Naomi","family":"Chan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3368-2215","authenticated-orcid":false,"given":"Leslie F.","family":"Sikos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,17]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-60774-0_17","volume-title":"Lecture Notes in Computer Science","author":"Martin La\u0161tovi\u010dka","year":"2017","unstructured":"La\u0161tovi\u010dka,\u00a0M., \u010celeda, P.: Situational awareness: detecting critical dependencies and devices in a network. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) Security of Networks and Services in An All-Connected World. AIMS 2017. Lecture Notes in Computer Science, vol. 10356. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-60774-0_17"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-98842-9_1","volume-title":"AI in Cybersecurity","author":"Leslie F. Sikos","year":"2018","unstructured":"Sikos, L.F.: OWL ontologies in cybersecurity: conceptual modeling of cyber-knowledge. In: Sikos, L.F. (ed.) AI in Cybersecurity, pp. 1\u201317. Springer, Cham, Switzerland (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-98842-9_1"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.procs.2018.07.206","volume":"126","author":"LF Sikos","year":"2018","unstructured":"Sikos, L.F., Stumptner, M., Mayer, W., Howard, C., Voigt, S., Philp, D.: Representing network knowledge using provenance-aware formalisms for cyber-situational awareness. Procedia Comput. Sci. 126, 29\u201338 (2018). \n                    https:\/\/doi.org\/10.1016\/j.procs.2018.07.206","journal-title":"Procedia Comput. Sci."},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-319-99247-1_12","volume-title":"Knowledge Science, Engineering and Management","author":"Leslie F. Sikos","year":"2018","unstructured":"Sikos, L.F., Stumptner, M., Mayer, W., Howard, C., Voigt, S., Philp, D.: Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awareness. In: Liu, W., Giunchiglia, F., Yang, B. (eds.) Knowledge Science, Engineering and Management, pp. 132\u2013143. Springer, Cham, Switzerland (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-99247-1_12"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.07.014","volume":"121","author":"DP Junior","year":"2018","unstructured":"Junior, D.P., Wille, E.C.G.: FB-APSP: a new efficient algorithm for computing all-pairs shortest-paths. J. Netw. Comput. Appl. 121, 33\u201343 (2018). \n                    https:\/\/doi.org\/10.1016\/j.jnca.2018.07.014","journal-title":"J. Netw. Comput. Appl."},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-17316-5_32","volume-title":"Advanced Data Mining and Applications","author":"Qi Ye","year":"2010","unstructured":"Ye, Q., Wu, B., Wang, B.: Distance distribution and average shortest path length estimation in real-world networks. In: Cao, L., Feng, Y., Zhong, J. (eds.) Advanced Data Mining and Applications. ADMA 2010. Lecture Notes in Computer Science, vol. 6440. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-17316-5_32"},{"key":"29_CR7","unstructured":"Sikos, L.F., Stumptner, M., Mayer, W., Howard, C., Voigt, S., Philp, D.: Summarizing network information for cyber-situational awareness via cyber-knowledge integration. In: AOC 2018 Convention, Adelaide, Australia, 30 May 2018"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.websem.2016.07.001","volume":"42","author":"MI Ali","year":"2017","unstructured":"Ali, M.I., Ono, N., Kaysar, M., Shamszaman, Z.U., Pham, T.-L., Gao, F., Griffin, K., Mileo, A.: Real-time data analytics and event detection for IoT-enabled communication systems. J. Web Semant. 42, 19\u201337 (2017). \n                    https:\/\/doi.org\/10.1016\/j.websem.2016.07.001","journal-title":"J. Web Semant."},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-26187-4_27","volume-title":"Lecture Notes in Computer Science","author":"Salima Benbernou","year":"2015","unstructured":"Benbernou, S., Huang, X., Ouziri, M.: Fusion of Big RDF data: a semantic entity resolution and query rewriting-based inference approach. In: Wang, J., et al. (eds.) Web Information Systems Engineering\u2014WISE 2015. Lecture Notes in Computer Science, vol. 9419. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-26187-4_27"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.websem.2018.12.003","volume":"55","author":"Manel Achichi","year":"2019","unstructured":"Achichi, M., Bellahsene, Z., Ellefi, M.B., Todorov, K.: Linking and disambiguating entities across heterogeneous RDF graphs. J. Web Semant., in press (2019). \n                    https:\/\/doi.org\/10.1016\/j.websem.2018.12.003","journal-title":"Journal of Web Semantics"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-319-46523-4_39","volume-title":"Lecture Notes in Computer Science","author":"Linhong Zhu","year":"2016","unstructured":"Zhu, L., Ghasemi-Gol, M., Szekely, P., Galstyan, A., Knoblock, C.A.: Unsupervised entity resolution on multi-type graphs. In: Groth, P., et al. (eds.) The Semantic Web\u2014ISWC 2016. Lecture Notes in Computer Science, vol. 9981. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-46523-4_39"},{"issue":"4","key":"29_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.websem.2015.05.004","volume":"35","author":"G Cheng","year":"2015","unstructured":"Cheng, G., Xu, D., Qu, Y.: C3D\u2009+\u2009P: a summarization method for interactive entity resolution. J. Web Semant. 35(4), 203\u2013213 (2015). \n                    https:\/\/doi.org\/10.1016\/j.websem.2015.05.004","journal-title":"J. Web Semant."},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-13486-9_11","volume-title":"Lecture Notes in Computer Science","author":"Joachim Kleb","year":"2010","unstructured":"Kleb, J., Abecker, A.: Entity reference resolution via spreading activation on RDF graphs. In: Aroyo, L., et al. (eds.) The Semantic Web: Research and Applications. ESWC 2010. Lecture Notes in Computer Science, vol. 6088. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-13486-9_11"},{"issue":"2","key":"29_CR14","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.websem.2015.07.002","volume":"35","author":"M Kejriwal","year":"2015","unstructured":"Kejriwal, M., Miranker, D.P.: An unsupervised instance matcher for schema-free RDF data. J. Web Semant. 35(2), 102\u2013123 (2015). \n                    https:\/\/doi.org\/10.1016\/j.websem.2015.07.002","journal-title":"J. Web Semant."},{"key":"29_CR15","unstructured":"Sikos, L.F., Philp, D., Voigt, S., Howard, C., Stumptner, M., Mayer, W.: Provenance-aware LOD datasets for detecting network inconsistencies. In: First International Workshop on Contextualized Knowledge Graphs (2018 International Semantic Web Conference), Monterey, CA, USA, 8\u201312 Oct 2018. \n                    http:\/\/ceur-ws.org\/Vol-2317"},{"key":"29_CR16","unstructured":"Gunning, D.: Explainable artificial intelligence (XAI). Defense Advanced Research Projects Agency (DARPA), Nov 2017"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.websem.2018.12.003","volume":"55","author":"Manel Achichi","year":"2019","unstructured":"Achichi, M., Bellahsene, Z., Ellefi, M.B., Todorov, K.: Linking and disambiguating entities across heterogeneous RDF graphs. J. Web Semant. Available online 2 Jan 2019\u2014In Press (2019). \n                    https:\/\/doi.org\/10.1016\/j.websem.2018.12.003","journal-title":"Journal of Web Semantics"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Decision Technologies 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-8311-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T15:07:16Z","timestamp":1563289636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-8311-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,17]]},"ISBN":["9789811383106","9789811383113"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-8311-3_29","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2019,7,17]]},"assertion":[{"value":"17 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}