{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:11:25Z","timestamp":1730283085497,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795293","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T21:49:56Z","timestamp":1482788996000},"page":"7-12","source":"Crossref","is-referenced-by-count":2,"title":["Mapping sample scenarios to operational models"],"prefix":"10.1109","author":[{"given":"Z. Berkay","family":"Celik","sequence":"first","affiliation":[]},{"family":"Nan Hu","sequence":"additional","affiliation":[]},{"family":"Yun Li","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Papernot","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Walls","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Rowe","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[]},{"given":"Novella","family":"Bartolini","sequence":"additional","affiliation":[]},{"given":"Thomas F.","family":"La Porta","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Moving target defense ii","author":"jajodia","year":"2013","journal-title":"Application of game Theory and Adversarial Modeling Series Advances in Information Security"},{"key":"ref3","first-page":"101","article-title":"Using a semantic approach to cyber impact assessment","author":"de barros barreto","year":"2013","journal-title":"STIDS"},{"key":"ref10","first-page":"2159","article-title":"Eliciting additive reward functions for markov decision processes","volume":"22","author":"regan","year":"2011","journal-title":"International Joint Conference on Artificial Intelligence (IJCAI)"},{"year":"0","key":"ref6","article-title":"Cyber virtual ad hoc network (cybervan)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623770"},{"key":"ref5","article-title":"Mission cyber security situation assessment using impact dependency graphs","author":"jakobson","year":"2011","journal-title":"Information Fusion"},{"key":"ref8","first-page":"491","article-title":"From throw-away traffic to bots: detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02742-0_5"},{"journal-title":"Stochastic Optimal Control The Discrete Time Case","year":"2007","author":"bertsekas","key":"ref2"},{"key":"ref9","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Security and Privacy"},{"journal-title":"Dynamic Programming and Optimal Control","year":"2005","author":"bertsekas","key":"ref1"}],"event":{"name":"MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795293.pdf?arnumber=7795293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:01:09Z","timestamp":1513195269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7795293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795293","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}