{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:27:11Z","timestamp":1729636031769,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cybersa.2015.7166121","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T21:18:14Z","timestamp":1438031894000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Improving situational awareness of cyber physical systems based on operator's goals"],"prefix":"10.1109","author":[{"given":"Jussi","family":"Timonen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-1-4419-0140-8_2","article-title":"Overview of cyber situation awareness","volume":"14","author":"tadda","year":"2010","journal-title":"Cyber Situational Awareness"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"article-title":"WISM II (2011-2012)","year":"2012","author":"bjorkbom","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.2017686"},{"journal-title":"YouTube","article-title":"WISM II","year":"2013","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2287302"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2011.5753452"},{"key":"ref17","article-title":"MAVEN-SA: Model-based automated visualization for enhanced situation awareness","author":"wood","year":"2005","journal-title":"Research Report U S Army Research Institute for the Behavioral Sciences"},{"key":"ref18","article-title":"Measures of platoon leader situation awareness in virtual decision-making exercises","author":"strater","year":"2001","journal-title":"Research Report U S Army Research Institute for the Behavioral Sciences"},{"journal-title":"DOD Dictionary of Military and Associated Terms","article-title":"United States Department of Defense","year":"2012","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b11371"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2008.10.010"},{"key":"ref6","article-title":"Situational awareness and visualization in a cyber environment and a C2 system of dismounted soldiers","author":"timonen","year":"2014","journal-title":"Poster presented at the Visualization for Cyber Security conference"},{"article-title":"Situational awareness in computer network defense: Principles, methods and applications","year":"2012","author":"ruiz","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916401"},{"key":"ref7","first-page":"8","article-title":"Visualizing common operating picture of critical infrastructure","volume":"9122","author":"rummukainen","year":"2014","journal-title":"Proceedings of SPIE Sensing Technology+Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049426"},{"key":"ref1","first-page":"646","article-title":"Exploring situational awareness: A review and the effects of stress on rectilinear normalisation","author":"beringer","year":"1989","journal-title":"Proceedings of the Fifth International Symposium on Aviation Psychology"},{"key":"ref9","article-title":"Cyber SA: Situational Awareness for Cyber Defense","volume":"14","author":"bartford","year":"2010"}],"event":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,9]]}},"container-title":["2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153065\/7166109\/07166121.pdf?arnumber=7166121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:29:50Z","timestamp":1498235390000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7166121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2015.7166121","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}