{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:58Z","timestamp":1759091638625,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T00:00:00Z","timestamp":1429574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO","award":["W911NF-09-1-0525 (MURI)"],"award-info":[{"award-number":["W911NF-09-1-0525 (MURI)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,21]]},"DOI":"10.1145\/2746194.2746203","type":"proceedings-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T22:11:35Z","timestamp":1429308695000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes"],"prefix":"10.1145","author":[{"given":"Chen","family":"Zhong","sequence":"first","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"John","family":"Yen","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Rob","family":"Erbacher","sequence":"additional","affiliation":[{"name":"Army Research Lab"}]},{"given":"Renee","family":"Etoty","sequence":"additional","affiliation":[{"name":"Army Research Lab"}]},{"given":"Christopher","family":"Garneau","sequence":"additional","affiliation":[{"name":"Army Research Lab"}]}],"member":"320","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"volume-title":"Kaspersky Lab","year":"2014","author":"Lab K.","key":"e_1_3_2_1_1_1"},{"first-page":"229","volume-title":"Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts","author":"D'Amico A.","key":"e_1_3_2_1_2_1"},{"first-page":"85","volume-title":"Aggregation and correlation of intrusion-detection alerts","author":"Debar H.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"\"VAST Challenge 2012 Mini-Challenge 2 \" Visual Analytics Community 2012.  \"VAST Challenge 2012 Mini-Challenge 2 \" Visual Analytics Community 2012."},{"issue":"5","key":"e_1_3_2_1_5_1","first-page":"47","article-title":"The hidden traps in decision making","volume":"76","author":"Hammond J. S.","year":"1998","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4419-0140-8_1","volume-title":"Cyber SA: Situational awareness for cyber defense,\" Cyber Situational Awareness","author":"Barford P.","year":"2010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191682"},{"first-page":"2","volume-title":"The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis","author":"Pirolli P.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7304.001.0001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/25030.25033"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.87.3.215"},{"volume-title":"The think aloud method: A practical guide to modelling cognitive processes: Academic Press London","year":"1994","author":"Van Someren M. W.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"577","volume-title":"Cognitive task analysis,\" Handbook of research on educational communications and technology","author":"Clark R. E.","year":"2008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001673036"},{"key":"e_1_3_2_1_16_1","first-page":"19","volume-title":"The real work of computer network defense analysts,\" VizSEC","author":"D'Amico A.","year":"2007"},{"volume-title":"Strangers to ourselves: Discovering the adaptive unconscious: Harvard University Press","year":"2009","author":"Wilson T. D.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315799681"},{"volume-title":"Building a Successful SOC","year":"2013","author":"Operations Security","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"32","article-title":"The science of analytical reasoning","author":"Thomas J.","year":"2005","journal-title":"Illuminating the Path: The Research and Development Agenda for Visual Analytics"},{"first-page":"263","volume-title":"How to use experience in cyber analysis: An analytical reasoning support system","author":"Zhong C.","key":"e_1_3_2_1_21_1"},{"first-page":"230","volume-title":"RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis","author":"Zhong C.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"J. Y. Chen Zhong Peng Liu Rob Erbacher Renee Etoty and Christopher Garneau \"ARSCA: A Computer Tool for Tracing the Cognitive Processes of Cyber-Attack Analysis.\"  J. Y. Chen Zhong Peng Liu Rob Erbacher Renee Etoty and Christopher Garneau \"ARSCA: A Computer Tool for Tracing the Cognitive Processes of Cyber-Attack Analysis.\""},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03200549"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iws014"},{"first-page":"13","volume-title":"A reflection on seven years of the VAST challenge","author":"Scholtz J.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/0141192032000137349"}],"event":{"name":"HotSoS '15: Symposium and Bootcamp on the Science of Security","sponsor":["US Army Research Office US Army Research Office","NSF National Science Foundation","University of Illinois at Urbana-Champaign","National Security Agency National Security Agency"],"location":"Urbana Illinois","acronym":"HotSoS '15"},"container-title":["Proceedings of the 2015 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746194.2746203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746194.2746203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:44Z","timestamp":1750227404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746194.2746203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,21]]},"references-count":27,"alternative-id":["10.1145\/2746194.2746203","10.1145\/2746194"],"URL":"https:\/\/doi.org\/10.1145\/2746194.2746203","relation":{},"subject":[],"published":{"date-parts":[[2015,4,21]]},"assertion":[{"value":"2015-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}