{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:34Z","timestamp":1750307074209,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-07-C-0163"],"award-info":[{"award-number":["FA8750-07-C-0163"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2379690.2379693","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"17-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Visualization design for immediate high-level situational assessment"],"prefix":"10.1145","author":[{"given":"Robert F.","family":"Erbacher","sequence":"first","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"318","article-title":"Fighter cockpits of the future","author":"Adam E. C.","year":"1993","journal-title":"Proceedings of 12th IEEE\/AIAA Digital Avionics Systems Conference (DASC)"},{"key":"e_1_3_2_1_2_1","unstructured":"Anita D'Amico Daniel Tesone Kirsten Whitley Brianne O'Brien Emilie Roth \"Understanding the Cyber Defender: A Cognitive Task Analysis of Information Assurance Analysts \" Report No. CSA-CTA-1-1. Secure Decisions. Funded by ARDA and DOD. Anita D'Amico Daniel Tesone Kirsten Whitley Brianne O'Brien Emilie Roth \"Understanding the Cyber Defender: A Cognitive Task Analysis of Information Assurance Analysts \" Report No. CSA-CTA-1-1. Secure Decisions. Funded by ARDA and DOD."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850805"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Robert F. Erbacher \"Visual Situational Awareness for Vulnerability and Impact Assessment \" AFRL Final Report Final Report number in DTIC AFRL-RI-RS-TR-2008-269 C Distribution Restrictions October 2008. Robert F. Erbacher \"Visual Situational Awareness for Vulnerability and Impact Assessment \" AFRL Final Report Final Report number in DTIC AFRL-RI-RS-TR-2008-269 C Distribution Restrictions October 2008.","DOI":"10.2172\/943441"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.5"},{"key":"e_1_3_2_1_9_1","first-page":"75300H","volume-title":"Proceedings of the SPIE 2010 Conference on Visualization and Data Analysis","author":"Robert F.","year":"2010"},{"key":"e_1_3_2_1_10_1","first-page":"109","volume-title":"Springer-Verlag","author":"Robert F.","year":"1995"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.49"},{"key":"e_1_3_2_1_12_1","unstructured":"Stefano Foresti and Jim Agutter \"Cognitive Task Analysis Report \" University of Utah CROMDI.. Funded by ARDA and DOD. Stefano Foresti and Jim Agutter \"Cognitive Task Analysis Report \" University of Utah CROMDI.. Funded by ARDA and DOD."},{"volume-title":"Springer","year":"2009","author":"Jajodia S.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"MILCOM 2009","author":"Nusinov M.","year":"2009"},{"key":"e_1_3_2_1_16_1","unstructured":"Patro A. \"Pixel Oriented Visualization in XmdvTool \" Master Thesis Worcester Polytechnic Institute Worcester MA August 2004. Patro A. \"Pixel Oriented Visualization in XmdvTool \" Master Thesis Worcester Polytechnic Institute Worcester MA August 2004."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"2008 11th International Conference on, vol., no.","author":"Salerno J.","year":"2008"},{"volume-title":"IAW '07","author":"Streilein W.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSE.2008.53"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029214"},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.vizsec.org\/vizsec-events-2\/ http:\/\/www.vizsec.org\/vizsec-events-2\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Visualization: Gauge http:\/\/code.google.com\/apis\/chart\/interactive\/docs\/gallery\/gauge.html Visualization: Gauge http:\/\/code.google.com\/apis\/chart\/interactive\/docs\/gallery\/gauge.html"}],"event":{"name":"VizSec '12: 2012 Symposium on Visualization for Cyber Security","acronym":"VizSec '12","location":"Seattle Washington USA"},"container-title":["Proceedings of the Ninth International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379690.2379693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":22,"alternative-id":["10.1145\/2379690.2379693","10.1145\/2379690"],"URL":"https:\/\/doi.org\/10.1145\/2379690.2379693","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}