{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:55:47Z","timestamp":1725465347831},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949412","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"171-178","source":"Crossref","is-referenced-by-count":4,"title":["Security visualization: Cyber security storm map and event correlation"],"prefix":"10.1109","author":[{"given":"Denise","family":"Ferebee","sequence":"first","affiliation":[]},{"given":"Dipankar","family":"Dasgupta","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Qishi","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Common Vulnerabilities and Exposures","year":"2010","key":"ref33"},{"key":"ref32","article-title":"Advanced Cyber Attack Modeling, Analysis, and Visualization","author":"jajodia","year":"2010","journal-title":"George Mason University"},{"key":"ref31","article-title":"An Integrated Cyber Security Monitoring System Using Correlation-based Techniques","author":"wu","year":"2009","journal-title":"Fourth International Conference on System of Systems Engineering"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558661"},{"article-title":"ITIL: The Basics","year":"2010","author":"arraj","key":"ref10"},{"article-title":"ITIL V3 and ISO\/IEC 20000","year":"2008","author":"dugmore","key":"ref11"},{"journal-title":"ITIL","year":"2010","key":"ref12"},{"article-title":"Leverage ITIL v.3 to Integrate Information Security With the IT Service Management Life Cycle","year":"2009","author":"scholtz","key":"ref13"},{"year":"2007","key":"ref14","article-title":"Everything You Wanted to Know About ITIL in Less Than One Thousand Words!"},{"journal-title":"PCI Security Standards Council","year":"2009","key":"ref15"},{"journal-title":"PCI Security Standards Council","year":"2010","key":"ref16"},{"journal-title":"ISO\/IEC\/ITU-T SAG on Security (SAG-S)","year":"2010","key":"ref17"},{"journal-title":"International Organization for Standardization","year":"2010","key":"ref18"},{"journal-title":"International Standardization on Security","year":"2010","key":"ref19"},{"journal-title":"Common Vulnerability Scoring System","year":"2010","key":"ref28"},{"journal-title":"ACM SIGCHI Curricula for Human-Computer Interaction","article-title":"Strong and Verplank Hewett","year":"1996","key":"ref4"},{"journal-title":"Forum of Insident Response and Security Teams","year":"2009","key":"ref27"},{"journal-title":"Introduction to Computer Security","year":"2004","author":"bishop","key":"ref3"},{"article-title":"Applied Security Visualization","year":"2008","author":"marty","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925091"},{"article-title":"An Overview of Threat and Risk Assessment","year":"2002","author":"bayne","key":"ref5"},{"article-title":"Best Practices for Conducting a Business Impact Analysis","year":"2006","author":"witty","key":"ref8"},{"journal-title":"ArcGIS","year":"0","key":"ref7"},{"article-title":"Best Practices for Data Security Breach Disclosure","year":"2009","author":"litan","key":"ref2"},{"year":"2010","key":"ref9","article-title":"An Introductory Overview of ITIL V3"},{"journal-title":"Apple","year":"0","key":"ref1"},{"article-title":"Business Continuity Management Governance Defined, 2010","year":"2010","author":"witty","key":"ref20"},{"article-title":"Preparing For A Disaster: Determining the Essential Functions That Should Be Up First","year":"2006","author":"lyons","key":"ref22"},{"article-title":"Collaborating for Effective Security Architecture","year":"2010","author":"scholtz","key":"ref21"},{"key":"ref24","first-page":"115","article-title":"Using Guidelines to Assist in the Visualization Design Process","author":"nesbitt","year":"2005","journal-title":"Asia Pacific Symposium on Information Visualization (APVIS 2005)"},{"journal-title":"Information Visualization Perception for Design","year":"2004","author":"ware","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179596"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949412.pdf?arnumber=5949412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T02:41:25Z","timestamp":1490064085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949412","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}