{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:17:46Z","timestamp":1729649866297,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nafips.2016.7851582","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:24:14Z","timestamp":1487265854000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["FLUF: Fuzzy logic utility framework to support computer network defense decision making"],"prefix":"10.1109","author":[{"given":"E. Allison","family":"Newcomb","sequence":"first","affiliation":[]},{"given":"Robert","family":"Hammell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2882969"},{"year":"2015","key":"ref30"},{"key":"ref10","article-title":"A fuzzy logic utility framework (FLUF) to support information assurance","author":"newcomb","year":"2016","journal-title":"Studies in Computational Intelligence"},{"key":"ref11","first-page":"1","article-title":"An overview of the Carver Plus Shock method for food sector vulnerability assessments","author":"catlin","year":"2007"},{"journal-title":"Anonymous","year":"2015","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11391-3","author":"kott","year":"2014","journal-title":"Cyber Defense and Situational Awareness"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949390"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/351047"},{"journal-title":"Homeland Security Einstein","year":"2016","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775101"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"article-title":"Joint Publication 3&#x2013;13 Information Operations","year":"2014","author":"staff","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/21.281432"},{"key":"ref4","article-title":"Executive Order 13636 - Improving Critical Infrastructure Cybersecurity","volume":"78","year":"2013","journal-title":"Anonymous"},{"year":"2015","key":"ref27","article-title":"Common Vulnerability Scoring System v3.0: Specification Document"},{"journal-title":"Anonymous","article-title":"The National Military Strategy of the United States of America 2015","year":"2015","key":"ref3"},{"article-title":"Big data sends cybersecurity back to the future","year":"2015","author":"pegna","key":"ref6"},{"journal-title":"Cyber Time is of the Essence","year":"2016","author":"kallberg","key":"ref29"},{"article-title":"Benchmarking Security Information Event Management (SIEM)","year":"2009","author":"butler","key":"ref5"},{"year":"2016","key":"ref8","article-title":"Financial institutions' biggest cyberthreat: DDoS attacks"},{"key":"ref7","article-title":"Cybersecurity skills Ssortage demands new workforce strategies","author":"richards","year":"2015","journal-title":"SearchSecurity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA428100"},{"journal-title":"Object Solutions Managing the Object-Oriented Project","year":"1995","author":"booch","key":"ref9"},{"key":"ref1","article-title":"Personnel rift: Job recruitment","author":"hoffman","year":"2016","journal-title":"SC Magazine"},{"year":"2012","key":"ref20","article-title":"Army Doctrinal Reference Publication (ADRP) 3&#x2013;05, Special Operations"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2016010101"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6250786"},{"key":"ref24","first-page":"1508","article-title":"Examining the Effects of the Value of Information on Intelligence Analyst Performance","author":"newcomb","year":"2012","journal-title":"Proceedings of the Conference on Information Systems Applied Research ISSN"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NORBERT.2014.6893858"},{"key":"ref26","first-page":"37","article-title":"Guide for Applying the Risk Management Framework to Federal Information Systems","volume":"800","year":"2010","journal-title":"NIST Special Publication"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2013.16"}],"event":{"name":"2016 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS)","start":{"date-parts":[[2016,10,31]]},"location":"El Paso, TX, USA","end":{"date-parts":[[2016,11,4]]}},"container-title":["2016 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819724\/7851572\/07851582.pdf?arnumber=7851582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:56:33Z","timestamp":1568822193000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7851582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/nafips.2016.7851582","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}