{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:16:29Z","timestamp":1730204189960,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/ccnc46108.2020.9045158","type":"proceedings-article","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T08:22:01Z","timestamp":1585297321000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks"],"prefix":"10.1109","author":[{"given":"Eric","family":"Muhati","sequence":"first","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Moses","family":"Garuba","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Evaluating the impact of cyber attacks on missions","author":"musman","year":"2010","journal-title":"MITRE Corporation"},{"key":"ref11","first-page":"466","article-title":"Network security visualization","author":"fligg","year":"2012","journal-title":"IEEE Network Special Issue on Recent Developments in Network Intrusion Detection"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2018.8709182"},{"key":"ref13","volume":"186","author":"hwang","year":"2012","journal-title":"Multiple Attribute Decision Making Methods and Applications A State-of-the-Art Survey"},{"key":"ref14","article-title":"Seminumerical Algorithms","volume":"2","author":"knuth","year":"1981","journal-title":"The art of the computer programming"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1038\/nature09008","article-title":"Random numbers certified by bell's theorem","volume":"464","author":"pironio","year":"2010","journal-title":"Nature"},{"journal-title":"On dots Entity component system - unity software","year":"2019","author":"meijer","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9779.2007.00320.x"},{"journal-title":"Information Visualization Perception for Design","year":"2012","author":"ware","key":"ref4"},{"key":"ref3","article-title":"Factors impacting performance in competitive cyber exercises","author":"silva","year":"2014","journal-title":"Sandia National Lab (SNLNM) Albuquerque NM (United States)"},{"journal-title":"Threat-based Defense","year":"2014","key":"ref6"},{"key":"ref5","first-page":"264","article-title":"A cyber attack evaluation methodology","author":"pipyros","year":"0","journal-title":"13th European Conference on Cyber Warfare and Security"},{"key":"ref8","first-page":"73","article-title":"Taxonomy of cyber attacks and simulation of their effects","author":"chapman","year":"0","journal-title":"2011 Military Modeling & Simulation Symposium"},{"key":"ref7","first-page":"678","article-title":"Ipmatrix: An effective visualization framework for cyber threat monitoring","author":"ohnof","year":"0","journal-title":"Ninth International Conference on Information Visualisation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"journal-title":"National Vulnerability Database","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622049"}],"event":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2020,1,10]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2020,1,13]]}},"container-title":["2020 IEEE 17th Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9035667\/9045096\/09045158.pdf?arnumber=9045158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:46:10Z","timestamp":1656344770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9045158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccnc46108.2020.9045158","relation":{},"subject":[],"published":{"date-parts":[[2020,1]]}}}