{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:11Z","timestamp":1750307951068,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"DOI":"10.1145\/1292491.1292497","type":"proceedings-article","created":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T12:51:38Z","timestamp":1192366298000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Simulating adversarial interactions between intruders and system administrators using OODA-RR"],"prefix":"10.1145","author":[{"given":"T. J.","family":"Grant","sequence":"first","affiliation":[{"name":"Netherlands Defence Academy, PA Breda, Netherlands"}]},{"given":"H. S.","family":"Venter","sequence":"additional","affiliation":[{"name":"University of Pretoria, Pretoria, South Africa"}]},{"given":"J. H. P.","family":"Eloff","sequence":"additional","affiliation":[{"name":"University of Pretoria, Pretoria, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2007,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.17"},{"volume-title":"Software Engineering Institute","year":"2000","author":"Allen J.","key":"e_1_3_2_1_2_1"},{"volume-title":"Institute for System Technology","year":"2003","author":"Arvidson M.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_5_1","first-page":"978","article-title":"Hacking for Dummies. Second edition, Wiley Publishing, Inc., Hoboken","volume":"13","author":"Beaver K","year":"2007","journal-title":"NJ, USA."},{"volume-title":"University of Pretoria","year":"2004","author":"Bihina M.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Blum D. A Systematic Comprehensive Approach to Information Security. White paper Burton Group Midvale UH USA 2005.  Blum D. A Systematic Comprehensive Approach to Information Security . White paper Burton Group Midvale UH USA 2005."},{"volume-title":"Proceedings of International Conference on Automated Planning and Scheduling (ICAPS'05)","year":"2005","author":"Boddy M.","key":"e_1_3_2_1_8_1"},{"volume-title":"Boyd, J. R. A Discourse on Winning and Losing. Unpublished lecture notes","year":"1976","author":"Boyd J. R.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Boyd J. R. The Essence of Winning and Losing. Unpublished lecture notes 1996.  Boyd J. R. The Essence of Winning and Losing . Unpublished lecture notes 1996."},{"volume-title":"Proceedings, 10th International Command &amp; Control Research &amp; Technology Symposium (ICCRTS'05)","year":"2005","author":"Brehmer B.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Dehn D. M. Private communication National Aerospace Laboratory (NLR) Amsterdam Netherlands 26 February 2004.  Dehn D. M. Private communication National Aerospace Laboratory (NLR) Amsterdam Netherlands 26 February 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"volume-title":"Digital Forensic Research Workshop","year":"2004","author":"Dussault H. M. B.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1201\/b12461","volume-title":"Situation Awareness Analysis and Measurement. LEA","author":"Endsley M. R.","year":"2000"},{"key":"e_1_3_2_1_16_1","first-page":"266","article-title":"Military Command Team Effectiveness: Model and instrument for assessment and improvement. NATO RTP technical report AC\/323(HFM-087) TP\/59 (April 2005)","volume":"90","author":"Essens P.","year":"2005","journal-title":"ISBN"},{"key":"e_1_3_2_1_17_1","first-page":"2","article-title":"Cyber Forensics: A military operations perspective","volume":"1","author":"Giordano J.","year":"2002","journal-title":"International Journal of Digital Evidence"},{"volume-title":"Proceedings of the 2nd international Information Systems for Crisis Response And Management conference (ISCRAM'05)","year":"2005","author":"Grant T. J.","key":"e_1_3_2_1_18_1"},{"volume-title":"Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT'05)","year":"2005","author":"Grant T. J.","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the 10th International Command &amp; Control Research &amp; Technology Symposium (ICCRTS'05)","year":"2005","author":"Grant T. J.","key":"e_1_3_2_1_20_1"},{"volume-title":"Addison-Wesley","year":"1999","author":"Jackson P.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Jones A. K. and Sielken R. S. Computer System Intrusion Detection: A survey. Version 1.1 2000.  Jones A. K. and Sielken R. S. Computer System Intrusion Detection: A survey . Version 1.1 2000."},{"volume-title":"H. E. A Framework for Analysis of Decision Processes in Teams. In Proceedings of the 7th International Command and Control Research Technology Symposium (ICCRTS'02)","year":"2002","author":"Keus","key":"e_1_3_2_1_23_1"},{"volume-title":"USA","year":"1998","author":"Klein G.","key":"e_1_3_2_1_24_1"},{"volume-title":"USA","year":"1988","author":"Marca D.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"0","article-title":"Hacking Exposed: Network security secrets and solutions. Third edition, Osborne\/McGraw-Hill, Berkeley","volume":"10","author":"McClure S.","year":"2001","journal-title":"CA, USA."},{"volume-title":"Computer Associates","year":"2007","author":"Michael C.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","first-page":"0","article-title":"The Art of Intrusion: The real stories behind the exploits of hackers, intruders &amp; deceivers, Wiley Publishing","volume":"10","author":"Mitnick K. D.","year":"2005","journal-title":"Inc"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Moore A. P. Ellison R. J. and Linger R. C. Attack Modeling for Information Security and Survivability. Technical note CMU\/SEI-2001-TN-001 Software Engineering Institute Carnegie Mellon University Pittsburgh PA USA (March 2001).  Moore A. P. Ellison R. J. and Linger R. C. Attack Modeling for Information Security and Survivability . Technical note CMU\/SEI-2001-TN-001 Software Engineering Institute Carnegie Mellon University Pittsburgh PA USA (March 2001).","DOI":"10.21236\/ADA387544"},{"key":"e_1_3_2_1_30_1","unstructured":"Murray C. P. Network Forensics. Intrusion Detection and Network Forensics seminar (Fall 2000).  Murray C. P. Network Forensics. Intrusion Detection and Network Forensics seminar (Fall 2000)."},{"key":"e_1_3_2_1_31_1","unstructured":"Ohlsson F. Intrusion Management. Masters thesis report 06117 School of Mathematics and Systems Engineering V\u00e4xj\u00f6 University Sweden 2006.  Ohlsson F. Intrusion Management . Masters thesis report 06117 School of Mathematics and Systems Engineering V\u00e4xj\u00f6 University Sweden 2006."},{"key":"e_1_3_2_1_32_1","unstructured":"Pidd M. Computer Simulation in Management Science. John Wiley &amp; Sons.   Pidd M. Computer Simulation in Management Science . John Wiley &amp; Sons."},{"key":"e_1_3_2_1_33_1","first-page":"1439","article-title":"Choosing and Getting Started with a Cognitive Architecture to Test and Use Human-Machine Interfaces","volume":"7","author":"Ritter F. E","year":"2004","journal-title":"MMI-Interaktiv"},{"key":"e_1_3_2_1_34_1","unstructured":"Ruiu D. Cautionary Tales: Stealth coordinated attack. Originally published in Digital Mogul 2--7 (July 1999). Downloaded from http:\/\/www.nswc.navy.mil\/ISSEC\/CID\/Stealth_Coordinated_Attack.html (accessed 16 September 2006).  Ruiu D. Cautionary Tales: Stealth coordinated attack . Originally published in Digital Mogul 2--7 (July 1999). Downloaded from http:\/\/www.nswc.navy.mil\/ISSEC\/CID\/Stealth_Coordinated_Attack.html (accessed 16 September 2006)."},{"key":"e_1_3_2_1_35_1","unstructured":"Schneier B. Attack trees: Modeling security threats. Dr Dobb's Journal (December 1999).  Schneier B. Attack trees: Modeling security threats. Dr Dobb's Journal (December 1999)."},{"volume-title":"Carnegie Mellon University","year":"2004","author":"Sheyner O.","key":"e_1_3_2_1_36_1"},{"volume-title":"Proceedings, 11th International Command &amp; Control Research &amp; Technology Symposium (ICCRTS'06)","year":"2006","author":"Storms P. P. A.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","first-page":"6","article-title":"Vulnerability Forecasting -- A conceptual model. Computers &amp;","volume":"23","author":"Venter H. S.","year":"2004","journal-title":"Security"},{"key":"e_1_3_2_1_39_1","first-page":"0","article-title":"Sensemaking in Organizations. Sage, Thousand Oaks","volume":"10","author":"Weick K","year":"1995","journal-title":"CA, USA."},{"volume-title":"Proceedings of Workshop on Verification of Infinite State Systems with Applications to Security.","year":"2005","author":"Wing J. M.","key":"e_1_3_2_1_40_1"}],"event":{"name":"SAICSIT '07: 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","sponsor":["Telcom","Microsoft Microsoft","COE"],"location":"Port Elizabeth South Africa","acronym":"SAICSIT '07"},"container-title":["Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1292491.1292497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1292491.1292497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:49Z","timestamp":1750258669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1292491.1292497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":39,"alternative-id":["10.1145\/1292491.1292497","10.1145\/1292491"],"URL":"https:\/\/doi.org\/10.1145\/1292491.1292497","relation":{},"subject":[],"published":{"date-parts":[[2007,10,2]]},"assertion":[{"value":"2007-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}