{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:27:13Z","timestamp":1741325233203,"version":"3.38.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949390","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"25-30","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Cyber Knowledge uncertainty"],"prefix":"10.1109","author":[{"given":"Dean","family":"Lee","sequence":"first","affiliation":[]},{"given":"Samuel N.","family":"Hamilton","sequence":"additional","affiliation":[]},{"given":"Wendy L.","family":"Hamilton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.010827"},{"key":"ref13","first-page":"70","article-title":"Type-2 fuzzy trust aggregation","author":"rickard","year":"0","journal-title":"European Society of Fuzzy Logic and Technology Conference"},{"key":"ref14","article-title":"An interoperable context-sensitive model of trust","volume":"32","author":"indrakshi","year":"2009","journal-title":"Journal of Intelligent Information Systems"},{"key":"ref15","article-title":"Artificial reasoning with subjective logic","author":"j\u00f8saug","year":"0","journal-title":"Proceedings of the Second Australian Workshop on Commonsense Reasoning"},{"key":"ref16","article-title":"A vector model of trust for developing trustworthy systems","author":"indrajit","year":"0","journal-title":"Proceedings of European Symposium on Research in Computer Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2007.380672"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2517-6161.1968.tb00722.x","article-title":"A generalization of Bayesian inference","volume":"30","author":"arthur","year":"1968","journal-title":"Journal of the Royal Statistical Society Series B"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IMTC.2003.1207885"},{"key":"ref7","article-title":"Sensor fusion using Dempster-Shafer theory","author":"huadong","year":"0","journal-title":"Proceedings of IEEE Instrumentation and Measurement Technology Conference"},{"journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","year":"1988","author":"judea","key":"ref2"},{"key":"ref1","first-page":"1188","article-title":"Mission aware cyber policy representation","author":"samuel","year":"0","journal-title":"Privacy Security Risk and Trust Conf Social Computing"},{"key":"ref9","first-page":"429","article-title":"Pitfalls in data fusion (and how to avoid them)","volume":"1","author":"hall","year":"0","journal-title":"Proc Int Conf Information Fusion"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949390.pdf?arnumber=5949390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:42:45Z","timestamp":1741315365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949390","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}