{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:16:01Z","timestamp":1730225761516,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,20]]},"DOI":"10.1109\/hpec49654.2021.9622800","type":"proceedings-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T20:57:36Z","timestamp":1638392256000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach to Cyber Situational Awareness in Embedded Systems"],"prefix":"10.1109","author":[{"given":"Kyle","family":"Denney","sequence":"first","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Robert","family":"Lychev","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Donato","family":"Kava","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Alice","family":"Lee","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Michael","family":"Vai","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Nick","family":"Evancich","sequence":"additional","affiliation":[{"name":"Trusted S&#x0026;T"}]},{"given":"Richard","family":"Clark","sequence":"additional","affiliation":[{"name":"Trusted S&#x0026;T"}]},{"given":"David","family":"Lide","sequence":"additional","affiliation":[{"name":"Trusted S&#x0026;T"}]},{"given":"KJ","family":"Kwak","sequence":"additional","affiliation":[{"name":"Trusted S&#x0026;T"}]},{"given":"Jason","family":"Li","sequence":"additional","affiliation":[{"name":"Siege Technologies"}]},{"given":"Michael","family":"Lynch","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory"}]},{"given":"Kyle","family":"Tillotson","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory"}]},{"given":"Walt","family":"Tirenin","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory"}]},{"given":"Doug","family":"Schafer","sequence":"additional","affiliation":[{"name":"Cohere Technology Group"}]}],"member":"263","reference":[{"article-title":"Situational awareness: Make safe choices","year":"2020","author":"Ankerich","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375887"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-013-0892-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2018.8398693"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/bs.host.2016.07.001","article-title":"Chapter 4 - cygraph: Graph-based analytics and visualization for cybersecurity","volume-title":"Cognitive Computing: Theory and Applications","volume":"35","author":"Noel","year":"2016"},{"key":"ref6","first-page":"11","article-title":"Impact assessment of cyber actions on missions or business processes: A systematic literature review","volume-title":"ICCWS 2018 13th International Conference on Cyber Warfare and Security","author":"Bah\u015fi"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170806"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00104"},{"article-title":"Harden: A high assurance design environment","volume-title":"GOMACTech 2019 Conference","author":"Whitman","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2002.802819"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.4.2.4"},{"article-title":"Analyzing mission impacts of cyber actions (amica)","volume-title":"NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact","author":"Noel","key":"ref12"},{"key":"ref13","article-title":"Mission assurance as a function of scale","author":"Trepagnier","year":"2015","journal-title":"Assessing Mission Impact of Cyberattacks"},{"key":"ref14","first-page":"1","article-title":"Mission cyber security situation assessment using impact dependency graphs","volume-title":"14th International Conference on Information Fusion","author":"Jakobson"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795296"}],"event":{"name":"2021 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2021,9,20]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9622740\/9622741\/09622800.pdf?arnumber=9622800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:20:36Z","timestamp":1727500836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9622800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,20]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/hpec49654.2021.9622800","relation":{},"subject":[],"published":{"date-parts":[[2021,9,20]]}}}