{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:29Z","timestamp":1759091729994},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/cogsima.2012.6188392","type":"proceedings-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T20:52:20Z","timestamp":1335387140000},"page":"243-250","source":"Crossref","is-referenced-by-count":12,"title":["Experience-based cyber situation recognition using relaxable logic patterns"],"prefix":"10.1109","author":[{"given":"Po-Chun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"John","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Tracy","family":"Mullen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"15","article-title":"The recognition-primed decision model","author":"klein","year":"1998","journal-title":"Sources of Power How People Make Decisions"},{"key":"2","article-title":"Intrusion detection systems basics","author":"ning","year":"2006","journal-title":"Hand-book of Information Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/52.877859"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56804-2_34"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_2"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2704_2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237735"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(93)90046-J"},{"key":"11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1229285.1229288","article-title":"Topological analysis of network attack vulnerability","author":"jajodia","year":"2007","journal-title":"ASIACCS"},{"key":"12","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1160633.1160637","article-title":"RPD-enabled agents teaming with humans for multi-context decision making","author":"fan","year":"2006","journal-title":"AAMAS"}],"event":{"name":"2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2012)","start":{"date-parts":[[2012,3,6]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2012,3,8]]}},"container-title":["2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6182940\/6188356\/06188392.pdf?arnumber=6188392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:52:33Z","timestamp":1497981153000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6188392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2012.6188392","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}