{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:46:11Z","timestamp":1759092371811,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/cogsima.2015.7108194","type":"proceedings-article","created":{"date-parts":[[2015,5,19]],"date-time":"2015-05-19T20:05:39Z","timestamp":1432065939000},"page":"172-178","source":"Crossref","is-referenced-by-count":6,"title":["Difficulty-level metric for cyber security training"],"prefix":"10.1109","author":[{"given":"Zequn","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chien-Chung","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Sheetal","family":"Doshiy","sequence":"additional","affiliation":[]},{"given":"Nimmi","family":"Thomasy","sequence":"additional","affiliation":[]},{"given":"Ha","family":"Duong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229288"},{"article-title":"NetSPA: a Network Security Planning Architecture","year":"2002","author":"artz","key":"ref11"},{"article-title":"Scenario Graphs and Attack Graphs","year":"2004","author":"sheyner","key":"ref12"},{"key":"ref13","first-page":"8","article-title":"MuIVAL: A Logic-based Network Security Analyzer","author":"ou","year":"2005","journal-title":"Proceedings of the 14th Conference on USENIX Security Symposium Volume 14 ser SSYM'05 Berkeley CA USA USENIX Association"},{"journal-title":"Security metrics replacing fear uncertainty and doubt Addison-Wesley Professional","year":"2007","author":"jaquith","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719036"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602117"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314220"},{"article-title":"Robust topological sorting and Tarjan's algorithm in Python","year":"0","author":"harrison","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804779","author":"barber","year":"2012","journal-title":"Bayesian Reasoning and Machine Learning Cambridge University Press"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127499"},{"journal-title":"Forum of Incident Response and Security Teams (FIRST)","article-title":"Common vulnerability scoring system, v3","year":"0","key":"ref6"},{"key":"ref5","article-title":"An annotated review of past papers on attack graphs","author":"lippmann","year":"2005","journal-title":"MIT Lincoln Lab Rept"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188411"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.21"},{"article-title":"CyberCog:A Synthetic Task Environment for Measuring Cyber Situation","year":"2011","author":"rajivan","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"561","DOI":"10.3233\/JCS-130475","article-title":"Aggregating Vulnerability Metrics in Enterprise Networks Using Attack Graphs","volume":"21","author":"homer","year":"2013","journal-title":"J Comput Secur"},{"key":"ref21","first-page":"283","article-title":"An Attack Graph-Based Probabilistic Security Metric","author":"wang","year":"2008","journal-title":"Proceeedings of the 22nd Annual IFIP WG 11 3 Working Conference on Data and Applications Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1179494.1179497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23088-2_15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"}],"event":{"name":"2015 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","start":{"date-parts":[[2015,3,9]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7102993\/7107964\/07108194.pdf?arnumber=7108194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T18:26:49Z","timestamp":1691692009000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7108194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2015.7108194","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}