{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:39:08Z","timestamp":1769837948276,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670921","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9020-8408","authenticated-orcid":false,"given":"Georgi","family":"Nikolov","sequence":"first","affiliation":[{"name":"Royal Military School Brussels, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7870-7708","authenticated-orcid":false,"given":"Axelle","family":"Perez","sequence":"additional","affiliation":[{"name":"Universit\u00e9 libre de Bruxelles, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0696-8093","authenticated-orcid":false,"given":"Wim","family":"Mees","sequence":"additional","affiliation":[{"name":"Royal Military Academy Brussels, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. arXiv preprint arXiv:2110.15747","author":"Alavizadeh Hooman","year":"2021","unstructured":"Hooman Alavizadeh, Julian Jang-Jaccard, Simon\u00a0Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit\u00a0A Camtepe, and Dong\u00a0Seong Kim. 2021. A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. arXiv preprint arXiv:2110.15747 (2021)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2023.3263482"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2019.8842802"},{"key":"e_1_3_2_1_4_1","volume-title":"USA., VAC","author":"D\u2019Amico A","year":"2011","unstructured":"A D\u2019Amico. 2011. Visual Analytics for Cyber Defense Decision-Making. Washington, USA., VAC (2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.1988.195097"},{"key":"e_1_3_2_1_6_1","volume-title":"Situational awareness","author":"Endsley R","unstructured":"Mica\u00a0R Endsley. 2017. Direct measurement of situation awareness: Validity and use of SAGAT. In Situational awareness. Routledge, 129\u2013156."},{"key":"e_1_3_2_1_7_1","volume-title":"Situational awareness","author":"Endsley R","unstructured":"Mica\u00a0R Endsley. 2017. Toward a theory of situation awareness in dynamic systems. In Situational awareness. Routledge, 9\u201342."},{"key":"e_1_3_2_1_8_1","volume-title":"A systematic review and meta-analysis of direct objective measures of situation awareness: a comparison of SAGAT and SPAM. Human factors 63, 1","author":"Endsley R","year":"2021","unstructured":"Mica\u00a0R Endsley. 2021. A systematic review and meta-analysis of direct objective measures of situation awareness: a comparison of SAGAT and SPAM. Human factors 63, 1 (2021), 124\u2013150."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193129804200119"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2017.8073386"},{"key":"e_1_3_2_1_11_1","volume-title":"Special issue preface. Human factors 37, 1","author":"Gilson D","year":"1995","unstructured":"Richard\u00a0D Gilson. 1995. Special issue preface. Human factors 37, 1 (1995), 3\u20134."},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in psychology. Vol.\u00a052","author":"Hart G","unstructured":"Sandra\u00a0G Hart and Lowell\u00a0E Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. In Advances in psychology. Vol.\u00a052. Elsevier, 139\u2013183."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2991\/iccse-17.2017.24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133416.2146416"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407062"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3178195"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the third annual conference on privacy, security and trust, Vol.\u00a094","author":"Kayacik H\u00a0G\u00fcnes","year":"2005","unstructured":"H\u00a0G\u00fcnes Kayacik, A\u00a0Nur Zincir-Heywood, and Malcolm\u00a0I Heywood. 2005. Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets. In Proceedings of the third annual conference on privacy, security and trust, Vol.\u00a094. Citeseer, 1723\u20131722."},{"key":"e_1_3_2_1_18_1","volume-title":"Intrusion detection with Snort","author":"Koziol Jack","unstructured":"Jack Koziol. 2003. Intrusion detection with Snort. Sams Publishing."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA408560"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/08995605.2011.550222"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/ai3010005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109688"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"NATO","year":"2020","unstructured":"NATO 2020. IST Research Group on \"Visual Analytics for Complex Systems\". Retrieved June 10, 2024 from https:\/\/www.sto.nato.int\/search\/Pages\/activities_results.aspx?k=IST-184&s=Search%20Activities"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2918283"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260531"},{"key":"e_1_3_2_1_26_1","unstructured":"Georgi Nikolo and Wim Mees. [n. d.]. Evaluation through deployment of the Multi-agent System For Advanced Persistent Threat Detection framework in a Cyber Range environment. ([n. d.])."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/001401398186144"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1473871613490290"},{"key":"e_1_3_2_1_29_1","volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash\u00a0Habibi Lashkari, and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1 (2018), 108\u2013116."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICC.2017.8311756"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_32_1","volume-title":"Situational awareness","author":"Taylor M","unstructured":"Richard\u00a0M Taylor. 2017. Situational awareness rating technique (SART): The development of a tool for aircrew systems design. In Situational awareness. Routledge, 111\u2013128."},{"key":"e_1_3_2_1_33_1","unstructured":"Dustin\u00a0D Updyke Geoffrey\u00a0B Dobson Thomas\u00a0G Podnar Luke\u00a0J Osterritter Benjamin\u00a0L Earl and Adam\u00a0D Cerini. 2018. GHOSTS in the Machine: A Framework for Cyber-Warfare Exercise NPC Simulation. Technical Report. CARNEGIE-MELLON UNIV PITTSBURGH PA."},{"key":"e_1_3_2_1_34_1","volume-title":"Cyber situation awareness. NATO\/OTAN (STO-MP-IST-148)","author":"Varga Margaret","year":"2016","unstructured":"Margaret Varga, Carsten Winkelholz, and Susan Traber-Burdin. 2016. Cyber situation awareness. NATO\/OTAN (STO-MP-IST-148) (2016)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:17Z","timestamp":1755881537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":35,"alternative-id":["10.1145\/3664476.3670921","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670921","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}