{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:05:57Z","timestamp":1729649157896,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/cogsima.2015.7108191","type":"proceedings-article","created":{"date-parts":[[2015,5,19]],"date-time":"2015-05-19T20:05:39Z","timestamp":1432065939000},"page":"151-157","source":"Crossref","is-referenced-by-count":8,"title":["Risk-driven intent assessment and response generation in maritime surveillance operations"],"prefix":"10.1109","author":[{"given":"Rafael","family":"Falcon","sequence":"first","affiliation":[]},{"given":"Rami","family":"Abielmona","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Billings","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00616.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2014.7035641"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIVEMSA.2013.6617409"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ROSE.2013.6698432"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2605436"},{"key":"ref15","article-title":"Maritime anomaly detection: domain introduction and review of selected literature","author":"martineau","year":"2011","journal-title":"Tech Rep DREV-TM-2010-460 Defense R&D - Valcartier"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900231"},{"key":"ref17","article-title":"Transponder anomaly detection for maritime situational awareness","author":"baldacci","year":"2009","journal-title":"NATO Workshop on Data Fusion and Anomaly Detection for Maritime Situational Awareness"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256538"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.09.003"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1117\/12.477618","article-title":"Threat evaluation for impact assessment in situation analysis systems","volume":"4729","author":"roy","year":"2002","journal-title":"Proc of SPIE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSA.2011.6059924"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/KAMW.2008.4810531"},{"journal-title":"International Organization for Standardization","article-title":"Risk management: Principles and guidelines","year":"2009","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00139-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295318"}],"event":{"name":"2015 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","start":{"date-parts":[[2015,3,9]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7102993\/7107964\/07108191.pdf?arnumber=7108191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:56:19Z","timestamp":1498218979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7108191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2015.7108191","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}