{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:03:46Z","timestamp":1725581026932},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949396","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"76-83","source":"Crossref","is-referenced-by-count":1,"title":["A scalable architecture for improving the timeliness and relevance of cyber incident notifications"],"prefix":"10.1109","author":[{"given":"James L.","family":"Miller","sequence":"first","affiliation":[]},{"given":"Robert F.","family":"Mills","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Grimaila","sequence":"additional","affiliation":[]},{"given":"Michael W.","family":"Haas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Better Buying Power: Mandate for Restoring Affordability and Productivity in Defense Spending","author":"carter","year":"2010","journal-title":"Department of Defense"},{"article-title":"The Secret of Doing More With Less","year":"2010","author":"thatcher","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.176"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5380096"},{"year":"2010","key":"ref34","article-title":"Commander's Learning Agent"},{"key":"ref10","first-page":"24","article-title":"Information Asset Value Quantification","author":"hellesen","year":"2008","journal-title":"Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008)"},{"key":"ref11","article-title":"CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems from Evolving Threats","author":"wilshusen","year":"2009","journal-title":"United States Government Accountability Office GAO-11-753"},{"key":"ref12","article-title":"Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process","author":"grimaila","year":"2009","journal-title":"Proceedings of 2009 International Conference on Security and Management (SAM09)"},{"key":"ref13","article-title":"Improving Cyber Incident Notification in Military Operations","author":"grimaila","year":"2009","journal-title":"Proc of the 2009 Insitute of Industrial Engineers Annual Conference (IERC 2009)"},{"journal-title":"Joint Chiefs of Staff","article-title":"Joint Publication 1&#x2013;02: Department of Defense Dictionary of Military and Associated Terms","year":"2001","key":"ref14"},{"journal-title":"Headquarters Department of Army","article-title":"Army Regulation 600&#x2013;20: Army Command Policy","year":"2010","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"journal-title":"Department of the Air Force","article-title":"Air Force Instruction 33&#x2013;138: Enterprise Network Operations Notification and Tracking","year":"2005","key":"ref17"},{"key":"ref18","article-title":"Power to the Edge: Command&#x2026; Control&#x2026; in the Information Age","author":"alberts","year":"2003","journal-title":"US DOD Command and Control Research Center Publications"},{"key":"ref19","article-title":"Communicating Potential Mission Impact Using Shard Mission Representations","author":"hale","year":"2009","journal-title":"Proceedings of the 5th International Conference on Information Warfare and Security"},{"key":"ref28","article-title":"Understanding Command and Control","author":"alberts","year":"2006","journal-title":"US DOD Command and Control Research Center Publications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2007.368155"},{"key":"ref27","article-title":"Understanding Information Age Warfare","author":"alberts","year":"2001","journal-title":"US DOD Command and Control Research Center Publications"},{"key":"ref3","article-title":"Development of a Defensive Cyber Damage Assessment Framework","author":"fortson","year":"2007","journal-title":"Proc of the 2007 International Conference on Information Warfare and Security (ICIW 2007)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/2.755006"},{"key":"ref29","article-title":"Joint Battlespace Infosphere: Information Management within a C2 Enterprise","author":"combs","year":"2005","journal-title":"The Tenth International Command and Control Technology Symposium (ICCRTS)"},{"key":"ref5","first-page":"3","article-title":"Joint Publication 3-13: Information Operations","year":"2006","journal-title":"Joint Chiefs of Staff United States Department of Defense"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.88"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)88612-5"},{"article-title":"Information Security Protecting the Global Enterprise","year":"2000","author":"pipkin","key":"ref2"},{"key":"ref9","article-title":"An Architecture for Cyber Incident Mission Impact Assessment (CIMIA)","author":"sorrels","year":"0","journal-title":"Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008)"},{"article-title":"Information Warfare and Security","year":"1999","author":"denning","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804250"},{"article-title":"Computer Networking: A Top-Down Approach (Fifth Edition)","year":"2010","author":"kurose","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.69"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605680"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949396.pdf?arnumber=5949396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:24:55Z","timestamp":1490052295000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949396","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}