{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:48:35Z","timestamp":1771328915723,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/hpec.2019.8916528","type":"proceedings-article","created":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T07:11:36Z","timestamp":1575011496000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Proactive Cyber Situation Awareness via High Performance Computing"],"prefix":"10.1109","author":[{"given":"Allan","family":"Wollaber","sequence":"first","affiliation":[]},{"given":"Jaime","family":"Penna","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Blease","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Shing","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Alperin","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vilvovsky","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Trepagnier","sequence":"additional","affiliation":[]},{"given":"Neal","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Leonard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2018.8405029"},{"key":"ref11","first-page":"58","article-title":"GALILEO: A Generalized Low-Entropy Mixture Model","author":"savkli","year":"2017","journal-title":"Proceedings of the 2017 International Conference on Data Mining DMIN &#x2019;17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768429"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208266"},{"key":"ref15","first-page":"8","article-title":"Galaxy: A Network Emulation Framework for Cybersecurity","author":"schoonover","year":"2018","journal-title":"Usenix Conference on Cyber Security Experimentation and Test"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208287"},{"key":"ref17","author":"materese","year":"2013","journal-title":"THE NATIONAL VULNERABILITY DATABASE (NVD) OVERVIEW"},{"key":"ref18","year":"2019","journal-title":"Exploit Database"},{"key":"ref19","first-page":"19:1","article-title":"Latent Feature Vulnerability Ranking of CVSS Vectors","author":"ross","year":"2017","journal-title":"Proc Summer Simulation Multi-Conference (SummerSim)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96451-5_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285297"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61152-5_4"},{"key":"ref5","first-page":"17:1","article-title":"Capturing the Security Effects of Network Segmentation via a Continuous-time Markov Chain Model","author":"wagner","year":"2017","journal-title":"Proceedings of the 50th Annual Simulation Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2014.196"},{"key":"ref7","article-title":"Team Dynamics of Cybersecurity: Challenges and Opportunities for Team Cognition","volume":"4","author":"mancuso","year":"2019","journal-title":"Fields of Practice and Applied Solutions within Distributed Team Cognition"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591067"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2018.100118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190641"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2330784.2330799","article-title":"DEAP: A Python Framework for Evolutionary Algorithms","author":"de rainville","year":"2012","journal-title":"Proceedings of the 14th annual conference companion on Genetic and evolutionary computation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/1548512916662924"}],"event":{"name":"2019 IEEE High Performance Extreme Computing Conference (HPEC)","location":"Waltham, MA, USA","start":{"date-parts":[[2019,9,24]]},"end":{"date-parts":[[2019,9,26]]}},"container-title":["2019 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910148\/8916214\/08916528.pdf?arnumber=8916528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:47:02Z","timestamp":1658141222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8916528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpec.2019.8916528","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}