{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:43Z","timestamp":1761621343488,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073386","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:19:08Z","timestamp":1508944748000},"page":"1-8","source":"Crossref","is-referenced-by-count":19,"title":["Cybersecurity situational awareness taxonomy"],"prefix":"10.1109","author":[{"given":"Antti","family":"Evesti","sequence":"first","affiliation":[]},{"given":"Teemu","family":"Kanstren","sequence":"additional","affiliation":[]},{"given":"Tapio","family":"Frantti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wired Hackers Take Down the Most Wired Country in Europe Wired","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312767"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671502"},{"journal-title":"EU Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) Brussels","year":"2012","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245432"},{"key":"ref13","first-page":"6572","article-title":"NStreamAware: real-time visual analytics for data streams to enhance situational awareness","author":"fischer","year":"2014","journal-title":"Proc of Workshop on Visualization for Cyber Security (VIZSEC)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"journal-title":"Guardian HSBC suffers online banking cyber-attack The Guardian","year":"0","key":"ref15"},{"journal-title":"CISSP All-in-One Exam Guide","year":"2012","author":"harris","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"key":"ref18","first-page":"117","volume":"53","author":"heurix","year":"2015","journal-title":"A Taxonomy for Privacy Enhancing Technologies Computers & Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2016.14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/5254.747902"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"journal-title":"Readings in Information Visualization Using Vision To Think","year":"1999","author":"card","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/154193128803200221"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/482949"},{"key":"ref7","first-page":"19","article-title":"The Design, Instantiation, and Usage of Information Security Measuring Ontology","author":"evesti","year":"0","journal-title":"2nd International Conference on Models and Ontology-based Design of Protocols Architectures and Services"},{"key":"ref2","article-title":"Automated Clustering of Malware Variants","author":"awad","year":"0","journal-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2015.7182484"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"journal-title":"KPMG Unknown Threat in Finland","year":"0","key":"ref20"},{"journal-title":"National Cyber Security Centre Finland (NCSC-FI)","year":"0","key":"ref22"},{"journal-title":"National Cyber Security Centre (NCSC) Netherlands","year":"0","key":"ref21"},{"journal-title":"OWASP Top Ten Project","year":"0","key":"ref24"},{"journal-title":"NIST SP 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations","year":"2013","key":"ref23"},{"journal-title":"Security Intelligence German Steel Mill Meltdown Rising Stakes in the Internet of Things","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.002"}],"event":{"name":"2017 International Conference on Cyber-Situational Awareness, Data Analytics and Assessment (Cyber SA)","start":{"date-parts":[[2017,6,19]]},"location":"London","end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073386.pdf?arnumber=8073386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,2]],"date-time":"2020-02-02T09:30:21Z","timestamp":1580635821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8073386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073386","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}