{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:10Z","timestamp":1750306390498,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T00:00:00Z","timestamp":1440374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,24]]},"DOI":"10.1145\/2801040.2801052","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:03:51Z","timestamp":1448910231000},"page":"83-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Visual Cyber Situational Awareness for Critical Infrastructures"],"prefix":"10.1145","author":[{"given":"Marco","family":"Angelini","sequence":"first","affiliation":[{"name":"University of Rome \"La Sapienza\" Rome, Italy"}]},{"given":"Giuseppe","family":"Santucci","sequence":"additional","affiliation":[{"name":"University of Rome \"La Sapienza\" Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.panoptesec.eu\/","author":"Project ESEC","year":"2014","unstructured":"The Official Website of the PANOPT ESEC Project , http:\/\/www.panoptesec.eu\/ , 2014 . The Official Website of the PANOPTESEC Project, http:\/\/www.panoptesec.eu\/, 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"et al. Cyber SA: Situational awareness for cyber defense","author":"Barford P.","year":"2010","unstructured":"P. Barford , M. Dacier , T. G. Dietterich , M. Fredrikson , J. Giffin , S. Jajodia , S. Jha , J. Li , P. Liu , P. Ning , et al. Cyber SA: Situational awareness for cyber defense . Springer , 2010 . P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, J. Giffin, S. Jajodia, S. Jha, J. Li, P. Liu, P. Ning, et al. Cyber SA: Situational awareness for cyber defense. Springer, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1950654.1950680"},{"key":"e_1_3_2_1_4_1","volume-title":"DTIC Document","author":"Carroll S. C.","year":"2008","unstructured":"S. C. Carroll . Mission impact analysis visualization for enhanced situational awareness. Technical report , DTIC Document , 2008 . S. C. Carroll. Mission impact analysis visualization for enhanced situational awareness. Technical report, DTIC Document, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400527"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698979"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932229"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194964"},{"key":"e_1_3_2_1_9_1","volume-title":"Building an atlas of cyberspace. Cartographic Perspectives, (34):47--52","author":"Dodge M.","year":"1999","unstructured":"M. Dodge . Building an atlas of cyberspace. Cartographic Perspectives, (34):47--52 , 1999 . M. Dodge. Building an atlas of cyberspace. Cartographic Perspectives, (34):47--52, 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379693"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2013.6578842"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2011.6102491"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168026"},{"key":"e_1_3_2_1_15_1","first-page":"20","volume-title":"Visualisation and the Common Operational Picture","author":"Gr\u00e9goire M.","year":"2005","unstructured":"M. Gr\u00e9goire and L. Beaudoin . Visualisation for network situational awareness in computer network defence . Visualisation and the Common Operational Picture , pages 20 -- 21 , 2005 . M. Gr\u00e9goire and L. Beaudoin. Visualisation for network situational awareness in computer network defence. Visualisation and the Common Operational Picture, pages 20--1, 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413177"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/13658810903214203"},{"key":"e_1_3_2_1_18_1","first-page":"131","volume-title":"Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation -","volume":"60","author":"Hideshima Y.","year":"2006","unstructured":"Y. Hideshima and H. Koike . Starmine: A visualization system for cyber attacks . In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60 , APVis '06, pages 131 -- 138 , Darlinghurst, Australia, Australia , 2006 . Australian Computer Society, Inc. Y. Hideshima and H. Koike. Starmine: A visualization system for cyber attacks. In Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60, APVis '06, pages 131--138, Darlinghurst, Australia, Australia, 2006. Australian Computer Society, Inc."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517964"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753521"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1151903.1151904"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517961"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1856821.1856905"},{"key":"e_1_3_2_1_24_1","volume-title":"DTIC Document","author":"Stockman N.","year":"2012","unstructured":"N. Stockman , K. G. Vamvoudakis , L. Devendorf , T. H\u00f6llerer , R. Kemmerer , and J. P. Hespanha . A mission-centric visualization tool for cybersecurity situation awareness. Technical report , DTIC Document , 2012 . N. Stockman, K. G. Vamvoudakis, L. Devendorf, T. H\u00f6llerer, R. Kemmerer, and J. P. Hespanha. A mission-centric visualization tool for cybersecurity situation awareness. Technical report, DTIC Document, 2012."},{"key":"e_1_3_2_1_25_1","first-page":"052","article-title":"Security situation awareness based on visualization {j}","volume":"10","author":"S.","year":"2008","unstructured":"L.-s. YAN, T.-m. BAI, and S. WANG . Security situation awareness based on visualization {j} . Communications Technology , 10 : 052 , 2008 . L.-s. YAN, T.-m. BAI, and S. WANG. Security situation awareness based on visualization {j}. Communications Technology, 10:052, 2008.","journal-title":"Communications Technology"}],"event":{"name":"VINCI '15: The 8th International Symposium on Visual Information Communication and Interaction","acronym":"VINCI '15","location":"Tokyo AA Japan"},"container-title":["Proceedings of the 8th International Symposium on Visual Information Communication and Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801040.2801052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801040.2801052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801040.2801052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,24]]},"references-count":25,"alternative-id":["10.1145\/2801040.2801052","10.1145\/2801040"],"URL":"https:\/\/doi.org\/10.1145\/2801040.2801052","relation":{},"subject":[],"published":{"date-parts":[[2015,8,24]]},"assertion":[{"value":"2015-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}