{"id":"https://openalex.org/W2098459220","doi":"https://doi.org/10.1109/cogsima.2011.5753755","title":"A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance","display_name":"A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance","publication_year":2011,"publication_date":"2011-02-01","ids":{"openalex":"https://openalex.org/W2098459220","doi":"https://doi.org/10.1109/cogsima.2011.5753755","mag":"2098459220"},"language":"en","primary_location":{"id":"doi:10.1109/cogsima.2011.5753755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2011.5753755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084910948","display_name":"Tahia Infantes Morris","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tahia Infantes Morris","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014826623","display_name":"Liam M. Mayron","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liam M. Mayron","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088079642","display_name":"Wayne B. Smith","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wayne B. Smith","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009726872","display_name":"Margaret M. Knepper","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Margaret M. Knepper","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021866289","display_name":"Reg Ita","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reg Ita","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111821031","display_name":"Kevin L. Fox","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kevin L. Fox","raw_affiliation_strings":["Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]"],"affiliations":[{"raw_affiliation_string":"Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA","institution_ids":[]},{"raw_affiliation_string":"[Government Communications Systems Division, Harris Corporation, Melbourne, FL, USA]","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084910948"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9558,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.92664575,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":null,"first_page":"60","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6079482436180115},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.5580503940582275},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5064667463302612},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4593290686607361},{"id":"https://openalex.org/keywords/aeronautics","display_name":"Aeronautics","score":0.3243587017059326},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19444966316223145},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.13849148154258728}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6079482436180115},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.5580503940582275},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5064667463302612},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4593290686607361},{"id":"https://openalex.org/C178802073","wikidata":"https://www.wikidata.org/wiki/Q8421","display_name":"Aeronautics","level":1,"score":0.3243587017059326},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19444966316223145},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.13849148154258728}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cogsima.2011.5753755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2011.5753755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1885524","https://openalex.org/W1483434081","https://openalex.org/W1487060125","https://openalex.org/W1491237615","https://openalex.org/W1577783107","https://openalex.org/W2024164808","https://openalex.org/W2113013192","https://openalex.org/W2139412680","https://openalex.org/W2469875458","https://openalex.org/W4245256727","https://openalex.org/W4255397779","https://openalex.org/W4285719527","https://openalex.org/W6600074308","https://openalex.org/W6629025635","https://openalex.org/W6629287744","https://openalex.org/W6634711845","https://openalex.org/W6656442785","https://openalex.org/W6680573776"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2795328844","https://openalex.org/W2552246019","https://openalex.org/W2230785849","https://openalex.org/W2795100819","https://openalex.org/W2502697733","https://openalex.org/W2508779374","https://openalex.org/W2972971880"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1],"remain":[2],"elusive":[3],"and":[4,15,31,38,51,62,68,84,106,140,144,148,169,188,214],"are":[5,173],"increasingly":[6],"effective.":[7],"Information":[8],"security":[9,17],"professionals":[10],"regularly":[11],"monitor":[12],"network":[13],"resources":[14,45,182],"cyber":[16,91,121,161,199,207],"websites":[18],"with":[19,95],"an":[20,128],"interest":[21],"in":[22,46,55],"understanding":[23,117],"how":[24],"such":[25],"threats":[26,64],"expose":[27],"their":[28,71,75],"enterprise's":[29],"vulnerabilities":[30],"dependencies.":[32],"However,":[33],"information":[34,78,147,163,177,208],"must":[35,79],"be":[36,80,111],"persistently":[37],"purposefully":[39],"examined":[40],"from":[41,178],"a":[42,115,134,138,179,195],"multitude":[43],"of":[44,97,118,133,157,181],"order":[47],"to":[48,59,73,110,113,209],"establish":[49],"context":[50],"situational":[52],"awareness.":[53],"This":[54],"turn,":[56],"enables":[57],"organizations":[58],"perceive,":[60],"anticipate":[61],"counteract":[63],"before":[65],"they":[66],"occur":[67],"helps":[69],"assure":[70],"ability":[72],"accomplish":[74],"missions.":[76],"Global":[77],"transformed":[81],"into":[82],"timely":[83],"local":[85],"actionable":[86],"knowledge.":[87],"To":[88],"achieve":[89],"this,":[90],"event":[92,107,150],"data":[93],"coupled":[94],"knowledge":[96,136],"the":[98,119,145,155,158],"semantic":[99],"interrelationships":[100],"between":[101],"other":[102],"location,":[103],"object,":[104],"agent,":[105],"entities":[108],"need":[109],"factored":[112],"facilitate":[114],"clearer":[116],"total":[120],"landscape.":[122],"In":[123],"this":[124],"work,":[125],"we":[126],"introduce":[127],"ontology":[129],"driven":[130],"framework":[131],"comprising":[132],"dynamic":[135,196],"base,":[137],"functional":[139],"self-updating":[141],"mission":[142,162,170,200],"model,":[143],"associated":[146],"complex":[149],"processing":[151],"capabilities.":[152],"We":[153],"focus":[154],"description":[156],"system":[159],"on":[160,175,205],"needs,":[164],"whereby":[165],"collection,":[166],"processing,":[167],"management":[168,201],"model":[171],"updates":[172],"based":[174],"cyber-related":[176],"variety":[180],"including":[183],"commercial":[184],"news,":[185],"blogs,":[186],"wikis,":[187],"social":[189],"media":[190],"sources.":[191],"The":[192],"result":[193],"is":[194],"capability":[197],"for":[198],"that":[202],"provides":[203],"proactive,":[204],"demand":[206],"analysts,":[210],"professionals,":[211],"policy":[212],"makers,":[213],"support":[215],"personnel.":[216]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
