{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:56:07Z","timestamp":1766066167376,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0553"],"award-info":[{"award-number":["W911NF-09-1-0553"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845559CNS-0905537"],"award-info":[{"award-number":["CNS-0845559CNS-0905537"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076787","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"383-392","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Nexat"],"prefix":"10.1145","author":[{"given":"Casey","family":"Cipriano","sequence":"first","affiliation":[{"name":"UCSB, Santa Barbara, CA"}]},{"given":"Ali","family":"Zand","sequence":"additional","affiliation":[{"name":"UCSB, Santa Barbara, CA"}]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"UIUC, Urbana, IL"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"UCSB, Santa Barbara, CA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"UCSB, Santa Barbara, CA"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IBM Internet Security Systems. http:\/\/www.iss.net\/.  IBM Internet Security Systems. http:\/\/www.iss.net\/."},{"key":"e_1_3_2_1_2_1","volume-title":"December 5th","author":"International Capture The The","year":"2008","unstructured":"The 2008 UCSB International Capture The Flag (iCTF). http:\/\/ictf.cs.ucsb.edu\/archive\/iCTF_2008\/index.html , December 5th 2008 . The 2008 UCSB International Capture The Flag (iCTF). http:\/\/ictf.cs.ucsb.edu\/archive\/iCTF_2008\/index.html, December 5th 2008."},{"key":"e_1_3_2_1_3_1","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4419-0140-8_1","volume-title":"Cyber Situational Awareness","author":"Barford Paul","year":"2010","unstructured":"Paul Barford , Marc Dacier , Thomas G. Dietterich , Matt Fredrikson , Jon Giffin , Sushil Jajodia , Somesh Jha , Jason Li , Peng Liu , Peng Ning , Xinming Ou , Dawn Song , Laura Strater , Vipin Swarup , George Tadda , Cliff Wang , and John Yen . Cyber SA: Situational Awareness for Cyber Defense . In Sushil Jajodia, Peng Liu, Vipin Swarup, and Cliff Wang, editors, Cyber Situational Awareness , volume 46 of Advances in Information Security , pages 3 -- 13 . Springer US , 2010 . Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin, Sushil Jajodia, Somesh Jha, Jason Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George Tadda, Cliff Wang, and John Yen. Cyber SA: Situational Awareness for Cyber Defense. In Sushil Jajodia, Peng Liu, Vipin Swarup, and Cliff Wang, editors, Cyber Situational Awareness, volume 46 of Advances in Information Security, pages 3--13. Springer US, 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830542"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/645839.670735"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"e_1_3_2_1_7_1","volume-title":"Endsley. Design and Evaluation for Situation Awareness Enhancement. In Proceedings of the Human Factors Society 32nd Annual Meeting","volume":"1","author":"Mica","unstructured":"Mica R. Endsley. Design and Evaluation for Situation Awareness Enhancement. In Proceedings of the Human Factors Society 32nd Annual Meeting , volume 1 of Aerospace Systems : Situation Awareness in Aircraft Systems, pages 97--101, 1988. Mica R. Endsley. Design and Evaluation for Situation Awareness Enhancement. In Proceedings of the Human Factors Society 32nd Annual Meeting, volume 1 of Aerospace Systems: Situation Awareness in Aircraft Systems, pages 97--101, 1988."},{"key":"e_1_3_2_1_8_1","volume-title":"Plan Recognition in Intrusion Detection Systems. In DARPA Information Survivability Conference & Exposition (DISCEX)","author":"Geib C. W.","year":"2001","unstructured":"C. W. Geib and R. P. Goldman . Plan Recognition in Intrusion Detection Systems. In DARPA Information Survivability Conference & Exposition (DISCEX) , 2001 . C. W. Geib and R. P. Goldman. Plan Recognition in Intrusion Detection Systems. In DARPA Information Survivability Conference & Exposition (DISCEX), 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525297"},{"key":"e_1_3_2_1_10_1","volume-title":"Recognition-Primed Decision Strategies. Technical report ARI Research Note 96--36","author":"Klein Gary","year":"1996","unstructured":"Gary Klein and Beth Crandall . Recognition-Primed Decision Strategies. Technical report ARI Research Note 96--36 , United States Army Research Institute for the Behavioral and Social Sciences, April 1996 . http:\/\/handle.dtic.mil\/100.2\/ADA309570. Gary Klein and Beth Crandall. Recognition-Primed Decision Strategies. Technical report ARI Research Note 96--36, United States Army Research Institute for the Behavioral and Social Sciences, April 1996. http:\/\/handle.dtic.mil\/100.2\/ADA309570."},{"issue":"4","key":"e_1_3_2_1_11_1","first-page":"219","volume":"27","author":"Kruegel C.","year":"2004","unstructured":"C. Kruegel , W. Robertson , and G. Vigna . Using Alert Verification to Identify Successful Intrusion Attempts. Practice in Information Processing and Communication (PIK) , 27 ( 4 ): 219 -- 227 , October -- December 2004 . C. Kruegel, W. Robertson, and G. Vigna. Using Alert Verification to Identify Successful Intrusion Attempts. Practice in Information Processing and Communication (PIK), 27(4):219--227, October -- December 2004.","journal-title":"Using Alert Verification to Identify Successful Intrusion Attempts. Practice in Information Processing and Communication (PIK)"},{"key":"e_1_3_2_1_12_1","series-title":"Advances in Information Security","volume-title":"Intrusion Detection and Correlation: Challenges and Solutions","author":"Kruegel C.","year":"2005","unstructured":"C. Kruegel , F. Valeur , and G. Vigna . Intrusion Detection and Correlation: Challenges and Solutions , volume 14 of Advances in Information Security . Springer , 2005 . C. Kruegel, F. Valeur, and G. Vigna. Intrusion Detection and Correlation: Challenges and Solutions, volume 14 of Advances in Information Security. Springer, 2005."},{"key":"e_1_3_2_1_13_1","volume-title":"A Game Theoretic Approach to Attack Prediction. Technical report","author":"Liu P.","year":"2002","unstructured":"P. Liu and L. Li . A Game Theoretic Approach to Attack Prediction. Technical report , Penn State Cyber Security Group , 2002 . P. Liu and L. Li. A Game Theoretic Approach to Attack Prediction. Technical report, Penn State Cyber Security Group, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.3.4.64-71"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754709"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586144"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.58"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 7th USENIX Security Symposium","author":"Paxson V.","year":"1998","unstructured":"V. Paxson . Bro : A system for detecting network intruders in real-time . In Proceedings of the 7th USENIX Security Symposium , 1998 . V. Paxson. Bro: A system for detecting network intruders in real-time. In Proceedings of the 7th USENIX Security Symposium, 1998."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754710"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313160"},{"key":"e_1_3_2_1_24_1","volume-title":"Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Large Installation System Administration (LISA) Conference","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Large Installation System Administration (LISA) Conference , 1999 . M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Large Installation System Administration (LISA) Conference, 1999."},{"key":"e_1_3_2_1_25_1","first-page":"65","volume-title":"Proceedings of SPIE","volume":"5813","author":"Salerno J. J.","year":"2005","unstructured":"J. J. Salerno , M. L. Hinman , and D. M. Boulware . A situation awareness model applied to multiple domains . In Proceedings of SPIE , volume 5813 , pages 65 -- 74 , 2005 . J. J. Salerno, M. L. Hinman, and D. M. Boulware. A situation awareness model applied to multiple domains. In Proceedings of SPIE, volume 5813, pages 65--74, 2005."},{"key":"e_1_3_2_1_26_1","volume-title":"Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications","author":"Tadda G.","year":"2006","unstructured":"G. Tadda , J. J. Salerno , D. Boulware , M. Hinman , and S. Gorton . Realizing situation awareness within a cyber environment . In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2006 , volume 6242 . SPIE , 2006. G. Tadda, J. J. Salerno, D. Boulware, M. Hinman, and S. Gorton. Realizing situation awareness within a cyber environment. In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2006, volume 6242. SPIE, 2006."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.04.001"}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '11"},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076787","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076787"}},"subtitle":["a history-based approach to predict attacker actions"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":28,"alternative-id":["10.1145\/2076732.2076787","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076787","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}