{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:06:34Z","timestamp":1767452794991,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508410","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:19:29Z","timestamp":1540509569000},"page":"774-781","source":"Crossref","is-referenced-by-count":10,"title":["Information Requirements for National Level Cyber Situational Awareness"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Varga","sequence":"first","affiliation":[]},{"given":"Joel","family":"Brynielsson","sequence":"additional","affiliation":[]},{"given":"Ulrik","family":"Franke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"3","article-title":"Cyber SA: Situational awareness for cyber defense","volume":"46","author":"barford","year":"2010","journal-title":"Cyber Situational Awareness Issues and Research ser Advances in Informatio Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2016.7497780"},{"key":"ref31","first-page":"279","article-title":"Towards a cyber common operating picture","author":"conti","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/1071181312561063"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfp029"},{"key":"ref35","article-title":"The common operational picture: A powerful enabler or a cause of severe misunderstanding?","author":"spak","year":"2017","journal-title":"Proceedings of the 22nd International Command and Control Research and Technology Symposium (22nd ICCRTS)"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","article-title":"Judgment under uncertainty: Heuristics and biases","volume":"185","author":"tversky","year":"1974","journal-title":"Science"},{"key":"ref10","volume":"46","author":"jajodia","year":"2010","journal-title":"Cyber Situational Awareness Issues and Research ser Advances in Information Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12027"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21236\/ADA479729"},{"journal-title":"Network Centric Warfare Developing and Leveraging Information Superiority","year":"1999","author":"alberts","key":"ref13"},{"journal-title":"Tech Rep","article-title":"Homeland security exercise and evaluation program (HSEEP)","year":"2013","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400503"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127455"},{"key":"ref17","first-page":"51","article-title":"Uncertainty and risk management in cyber situational awareness","volume":"46","author":"li","year":"2010","journal-title":"Cyber Situational Awareness Issues and Research ser Advances in Information Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250794"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-642-00219-9_2","article-title":"Graph drawing for security visualization","author":"tamassia","year":"2009","journal-title":"Graph Drawing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.161"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-00333-3_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/713999739"},{"key":"ref6","article-title":"Analysis of situation awareness from critical incident reports","author":"klein","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref8","first-page":"413","article-title":"Divided by a common language: Cyber definitions in Chinese, Russian and English","author":"giles","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/14639220701561775"},{"key":"ref2","first-page":"99","article-title":"A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains","author":"lukasik","year":"2010","journal-title":"Proceedings of a Workshop on Deterring Cyberattacks Informing Strategies and Developing Options for U S Policy National Research Council"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38930-1_12"},{"key":"ref1","first-page":"63","article-title":"Offensive cyber operations and the use of force","volume":"4","author":"lin","year":"2010","journal-title":"National Security Law & Policy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2007.137"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39454-6_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11962977_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33448-1_31"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33161-9_42"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2011.5753427"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2018,8,28]]},"location":"Barcelona","end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508410.pdf?arnumber=8508410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:45:38Z","timestamp":1643222738000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508410","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}