{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:46:42Z","timestamp":1729676802728,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949397","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"84-91","source":"Crossref","is-referenced-by-count":2,"title":["Design considerations for a case-based reasoning engine for scenario-based cyber incident notification"],"prefix":"10.1109","author":[{"given":"Stephen M.","family":"Woskov","sequence":"first","affiliation":[]},{"given":"Michael R.","family":"Grimaila","sequence":"additional","affiliation":[]},{"given":"Robert F.","family":"Mills","sequence":"additional","affiliation":[]},{"given":"Michael W.","family":"Haas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"The risk-to-mission assessment process (RiskMAP): a sensitivity analysis and an extension to treat confidentiality issues","author":"watters","year":"2009","journal-title":"Institute for Information Infrastructure Protection (I3P)"},{"key":"ref38","article-title":"Process control system security technical risk assessment methodology & technical implementation","author":"kertzner","year":"2006","journal-title":"Institute for Information Infrastructure Protection (I3P)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00122-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1494959"},{"key":"ref31","first-page":"246","article-title":"CBR in battle planning","author":"goodman","year":"1989","journal-title":"Proceedings of the Second Workshop on Case-Based Reasoning"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-237-3.50005-4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/0749-596X(92)90008-L"},{"key":"ref36","article-title":"Retrieving stories for case-based teaching","author":"burke","year":"1996","journal-title":"Case-Based Reasoning Experiences Lessons and Future Directions"},{"key":"ref35","article-title":"A tutorial introduction to case-based reasoning","author":"kolodner","year":"1996","journal-title":"Case-Based Reasoning Experiences Lessons and Future Directions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888906000543"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1515\/9781400837403","author":"clausewitz","year":"1976","journal-title":"On War"},{"year":"2010","key":"ref40","article-title":"Department of the Air Force, Aircraft and Equipment Maintenance Management. AFI21-101"},{"key":"ref11","article-title":"Understanding Information Age Warfare","author":"alberts","year":"2001","journal-title":"The Command and Control Research Program"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630260604"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(90)90050-C"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00072-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199404)45:3<149::AID-ASI5>3.0.CO;2-J"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(97)00078-2"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","article-title":"Case-based reasoning: foundational issues, methodological variations, and system approaches","volume":"7","author":"aamodt","year":"1994","journal-title":"AI communications"},{"journal-title":"Dynamic Memory A Theory of Reminding and Learning in Computers and People","year":"1982","author":"schank","key":"ref19"},{"key":"ref28","article-title":"CHEF: A model of case-based planning","author":"hammond","year":"1986","journal-title":"Proceedings of AAAI-86"},{"key":"ref4","article-title":"Developing methods for timely and relevant mission impact estimation","author":"grimaila","year":"2009","journal-title":"Proceedings of SPIE Defense Security and Sensing 2009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2607(89)90070-9"},{"key":"ref3","article-title":"Design considerations for a cyber incident mission impact assessment (CIMIA) process","author":"grimaila","year":"2009","journal-title":"Proceedings of the 2009 International Conference on Security and Management"},{"journal-title":"Air Force Basic Doctrine AFDD 1","article-title":"Department of the Air Force","year":"2003","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/64.163669"},{"key":"ref5","first-page":"10","article-title":"Improving the cyber incident damage and mission impact assessment","volume":"11","author":"grimaila","year":"2008","journal-title":"IAnewsletter"},{"journal-title":"The Principles of War for the Information Age","year":"1998","author":"leonhard","key":"ref8"},{"year":"2006","key":"ref7","article-title":"Department of Defense, Information Operations"},{"journal-title":"Information Security Protecting the Global Enterprise","year":"2000","author":"pipkin","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1201\/b12461","author":"endsley","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"key":"ref1","article-title":"Improving cyber incident notification in military operations","author":"grimaila","year":"2009","journal-title":"Proceedings of the 2009 Industrial Engineering Research Conference"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.043"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(98)00066-5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/sres.976"},{"article-title":"Applying Knowledge Management: Techniques for Building Corporate Memories","year":"2003","author":"watson","key":"ref22"},{"journal-title":"Designing the User Interface Strategies for Effective Human-Computer Interaction","year":"2004","author":"shneiderman","key":"ref47"},{"article-title":"Inside Case-Based Reasoning","year":"1989","author":"riesbeck","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0025008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00155578"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13643"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(99)00020-9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.01.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0020-7373(91)90011-U"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.06.003"},{"article-title":"Applying Case-Based Reasoning: Techniques for Enterprise Systems","year":"1997","author":"watson","key":"ref25"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949397.pdf?arnumber=5949397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T08:43:08Z","timestamp":1592728988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949397\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949397","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}