{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:45:52Z","timestamp":1760708752995,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/cycon.2014.6916401","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T17:36:10Z","timestamp":1412789770000},"page":"157-173","source":"Crossref","is-referenced-by-count":12,"title":["Situational awareness and information collection from critical infrastructure"],"prefix":"10.1109","author":[{"given":"Jussi","family":"Timonen","sequence":"first","affiliation":[]},{"given":"Lauri","family":"Laaperi","sequence":"additional","affiliation":[]},{"given":"Lauri","family":"Rummukainen","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Puuska","sequence":"additional","affiliation":[]},{"given":"Jouko","family":"Vankka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2011.15"},{"journal-title":"Federal Incident Reporting Guidelines","year":"0","key":"22"},{"key":"17","article-title":"Wireless sensor systems in indoor situation modeling II (WISM II)","author":"virrankoski","year":"2013","journal-title":"Proceedings of the University of Vaasa"},{"key":"23","first-page":"189","article-title":"SUS-A: A quick and dirty usability scale","author":"brooke","year":"1996","journal-title":"Usability Evaluation in Industry London United Kingdom Taylor & Francis"},{"key":"18","article-title":"Application of the JDL data fusion process model for cyber security","author":"giacobe","year":"2010","journal-title":"Proc SPIE 7710 Multisensor Multisource Information Fusion Architectures Algorithms and Applications"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.1988.195097"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2287302"},{"key":"16","article-title":"Enhancing situational awareness by means of visualization and information integration of sensor networks","author":"timonen","year":"2013","journal-title":"Proc SPIE 8756 Multisensor Multisource Information Fusion Architectures Algorithms and Applications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SDF.2012.6327919"},{"key":"14","first-page":"1","article-title":"Measuring performance of cyber situation awareness systems","author":"tadda","year":"2008","journal-title":"11th International Conference on Information Fusion"},{"key":"11","first-page":"313","article-title":"A macro method for measuring economic-benefi t returns on cybersecurity investments: The table top approach","volume":"16","author":"garvey","year":"2012","journal-title":"The Journal of International Council on Systems Engineering"},{"journal-title":"MNE7 Collaborative Cyber Situational Awareness (CCSA) Information Sharing Framework","year":"2013","author":"stock","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1518\/001872095779049543","article-title":"Toward a theory of situation awareness in dynamic systems","volume":"37","author":"endsley","year":"1995","journal-title":"Human Factors"},{"journal-title":"Executive Order-Improving Critical Infrastructure Cybersecurity","year":"2013","key":"3"},{"key":"20","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1117\/12.477612","article-title":"JDL level 5 fusion model: User refi nement issues and applications in group tracking","author":"blasch","year":"2002","journal-title":"Proc SPIE 4729"},{"key":"2","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-540-25952-7_16","article-title":"Critical infrastructure integration modeling and simulation","author":"tolone","year":"2004","journal-title":"Intelligence and Security Informatics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168029"},{"key":"7","first-page":"1890","article-title":"COPULA model design and analysis on critical infrastructure interdependency","author":"liu","year":"2012","journal-title":"International Conference on Management Science and Engineering (ICMSE)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2011.112"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT.2007.11"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.72"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1401166"},{"key":"8","first-page":"832","article-title":"National critical infrastructure modeling and analysis based on complex system theory","author":"wang","year":"2011","journal-title":"First International Conference on Instrumentation Measurement Computer Communication and Control (IMCCC)"}],"event":{"name":"2014 6th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2014,6,3]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 6th International Conference On Cyber Conflict (CyCon 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6876058\/6916383\/06916401.pdf?arnumber=6916401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T20:48:33Z","timestamp":1565902113000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6916401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cycon.2014.6916401","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}