{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:26:40Z","timestamp":1729672000338,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/cogsima.2013.6523840","type":"proceedings-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T16:53:39Z","timestamp":1371142419000},"page":"155-162","source":"Crossref","is-referenced-by-count":5,"title":["Supporting threat evaluation through visual analytics"],"prefix":"10.1109","author":[{"given":"A.","family":"Dahlbom","sequence":"first","affiliation":[]},{"given":"T.","family":"Helldin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.5784\/23-2-54"},{"journal-title":"Evaluating the Performance of TEWA Systems","year":"2010","author":"johansson","key":"36"},{"key":"33","article-title":"Advanced Visual Analytics Methods for Literature Analysis","author":"oelke","year":"2012","journal-title":"Language Technology for Cultural Heritage Social Sciences and Humanities"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-70956-5_7","article-title":"Visual analytics: Definition, process, and challenges","author":"keim","year":"2008","journal-title":"Information Visualization"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.146"},{"key":"37","article-title":"Air Threat Assessment: Research, Model, and Dispaly Guidelines","author":"liebhaber","year":"0","journal-title":"Proceedings of the 2002 Command and Control Research and Technology Symposium 2002"},{"key":"38","article-title":"Surface Warface Threat Assessment: Requirements Definition","author":"liebhaber","year":"0","journal-title":"SSC San Diego San Diego CA 2002"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2006.46"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2008.4717866"},{"key":"41","article-title":"Application of Neural Network in the Field of Target Threat Evaluation","author":"dong","year":"0","journal-title":"International Joint Conference on Neural Networks Washington DC 1999"},{"key":"40","article-title":"Threat Evaluation Modelling for Dynamic Targets Using Fuzzy Logic Approach","author":"kumar","year":"0","journal-title":"Proceedings of the International Conference on Computer Science and Engineering Dubai UAE 2012"},{"key":"22","article-title":"Human performance and data fusion based decision aids","author":"bisantz","year":"0","journal-title":"Proceedings of the International Conference on Information Fusion Sunnyvale California USA 1999"},{"key":"23","article-title":"Information fusion for situation awareness","author":"salerno","year":"0","journal-title":"Proceedings of the International Conference on Information Fusion Annapolis Maryland USA 2003"},{"key":"24","article-title":"Building a framework for situation awareness","author":"salerno","year":"0","journal-title":"Proceedings of the International Conference on Information Fusion Stockholm Sweden 2004"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2005.1591827"},{"key":"26","first-page":"122","article-title":"Issues and Challenges in Situation Assessment (Level 2 Fusion)","volume":"1","author":"blasch","year":"2006","journal-title":"Journal of Advances in Information Fusion"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.01.005"},{"journal-title":"Visual Analytics for Maritime Anomaly Detection","year":"2011","author":"riveiro","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88269-5_11"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2007.4408209"},{"journal-title":"Concepts Models and Tools for Information Fusion","year":"2007","author":"bosse?","key":"2"},{"key":"1","first-page":"3","article-title":"Theoretical underpinnings of situation awareness: A critical review","author":"endsley","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2166966.2166996"},{"key":"30","article-title":"Visual analytics","author":"keim","year":"2008","journal-title":"Encyclopedia of Database Systems"},{"key":"6","first-page":"1","article-title":"A Bayesian network approach to threat evaluation with application to an air defense scenario","author":"johansson","year":"2008","journal-title":"2008 11th International Conference on Information Fusion FUSION"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2005.1591977"},{"key":"32","article-title":"Visual Analytics of Complex Firewall Configurations","author":"mansmann","year":"0","journal-title":"Proceedings of the 9th International Symposium on Visualization for Cyber Security Seattle WA USA 2012"},{"key":"4","first-page":"437","article-title":"Foundations of situation and threat assessment","author":"steinberg","year":"2009","journal-title":"Handbook of Multisensor Data Fusion Theory and Practice"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.5"},{"journal-title":"Illuminating the Path The Research and Development Agenda for Visual Analytics","year":"2005","author":"thomas","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2008.01.007"},{"key":"19","article-title":"Rethinking the JDL Data Fusion Levels","author":"steinberg","year":"2004","journal-title":"Proceedings of National Symposium on Sensor and Data Fusion"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1117\/12.341367","article-title":"Revisions to the JDL Data Fusion Model","author":"steinberg","year":"1999","journal-title":"Sensor Fusion Architectures Algorithms and Applications III"},{"key":"18","article-title":"Revisiting the JDL Data Fusion Model II","author":"llinas","year":"0","journal-title":"Proceedings of the 7th International Conference on Information Fusion Stockholm Sweden 28 June-1 July 2004"},{"key":"15","volume":"14","author":"mark","year":"2005","journal-title":"The Effects of Collaboration and System Transparency"},{"journal-title":"Interaction Design Beyond Human-Computer Interaction","year":"2002","author":"preece","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778543886"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/3468.844354"},{"key":"21","article-title":"JDL Level 5 fusion model: User refinement issues and applications in group tracking","author":"blasch","year":"2002","journal-title":"SPIE Aerosense"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038545.ch19","article-title":"Removing the HCI Bottleneck: How the Human-Computer Interface (HCI) Affects the Performance of Data Fusion Systems","author":"hall","year":"2001","journal-title":"Handbook of Multisensor Data Fusion"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.5784\/24-1-60"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188403"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2009.5089545"},{"key":"44","article-title":"Threat Assessment Using Bayesian Networks","author":"okello","year":"0","journal-title":"Proceedings of the 6th International Conference on Information Fusion Cairns Queensland Australia 2003"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2012.6223112"},{"key":"46","article-title":"Threat Assessment Based on Variable Parameter Dynamic Bayesian Network","author":"hou","year":"0","journal-title":"Proceedings of the 29th Chinese Control Conference Beijing China 2010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809403"}],"event":{"name":"2013 IEEE International Multi-Cognitive Methods in SituationDisciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2013)","start":{"date-parts":[[2013,2,25]]},"location":"San Diego, CA","end":{"date-parts":[[2013,2,28]]}},"container-title":["2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520997\/6523810\/06523840.pdf?arnumber=6523840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T06:23:57Z","timestamp":1563171837000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6523840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2013.6523840","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}