{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:06:24Z","timestamp":1729616784437,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/sdf.2012.6327919","type":"proceedings-article","created":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T15:06:59Z","timestamp":1350400019000},"page":"116-119","source":"Crossref","is-referenced-by-count":13,"title":["The JDL model of data fusion applied to cyber-defence — A review paper"],"prefix":"10.1109","author":[{"given":"S.","family":"Schreiber-Ehle","sequence":"first","affiliation":[]},{"given":"W.","family":"Koch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00806-9"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/EEIS.1995.513773"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041808"},{"key":"16","article-title":"On the Application of Multiple Hypothesis Tracking to the Cyber Domain","author":"schwoegler","year":"0","journal-title":"The 14th International Conference on Information Fusion 2011 Chicago IL"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2007.4299771"},{"journal-title":"An Information Fusion Framework for Threat Assessment","year":"0","author":"beaver","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757795"},{"journal-title":"An Integrated Cyber Security Monitoring System Using Correlation-based Techniques","year":"0","author":"wu","key":"12"},{"journal-title":"Fusia Future Situation and Impact Awareness","year":"0","author":"holsopple","key":"3"},{"key":"2","article-title":"Application of the JDL Data Fusion Process Model for Cyber Security","volume":"7710","author":"giacobe","year":"0","journal-title":"Proc of SPIE"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420053098","author":"liggins","year":"2008","journal-title":"Handbook of Multisensor Data Fusion Theory and Practice"},{"key":"10","article-title":"Mission Cyber Security Situation Assessment Using Impact Dependency Graphs","author":"jacobson","year":"0","journal-title":"The 14th International Conference on Information Fusion 2011 Chicago IL"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1524\/teme.2007.74.3.93"},{"journal-title":"Real-time Fusion and Projection of Network Intrusion Activity","year":"0","author":"byers","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454758"},{"journal-title":"Strategies Comparison for Game Theoretic Cyber Situational Awareness and Impact Assessment","year":"0","author":"shen","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"journal-title":"High-level Information Fusion for Tracking and Projection of Multistage Cyber Attacks","year":"2007","author":"yang","key":"8"}],"event":{"name":"2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF)","start":{"date-parts":[[2012,9,4]]},"location":"Bonn, Germany","end":{"date-parts":[[2012,9,6]]}},"container-title":["2012 Workshop on Sensor Data Fusion: Trends, Solutions, Applications (SDF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6313482\/6327895\/06327919.pdf?arnumber=6327919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:27:48Z","timestamp":1497994068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6327919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/sdf.2012.6327919","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}