2010
DOI: 10.1117/12.850275
|View full text |Cite
|
Sign up to set email alerts
|

Application of the JDL data fusion process model for cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 15 publications
0
13
0
1
Order By: Relevance
“…Besides, the spontaneous and continuous attention of many researchers to this field has made the researches on cybersecurity the top hot issue. In order to fully understand the research status of network security situational awareness, this paper firstly searched and reviewed articles on this topic in the past 10 years in the core database in September 2017, and sorted out a total of 10 large citations of review literature [16,[37][38][39][40][41][42][43][44][45]. Based on the actor-network theory, Kopylec et al [37] explored the critical relationship between physical and network infrastructure, and demonstrated the results of situational awareness through visual cascading.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
See 3 more Smart Citations
“…Besides, the spontaneous and continuous attention of many researchers to this field has made the researches on cybersecurity the top hot issue. In order to fully understand the research status of network security situational awareness, this paper firstly searched and reviewed articles on this topic in the past 10 years in the core database in September 2017, and sorted out a total of 10 large citations of review literature [16,[37][38][39][40][41][42][43][44][45]. Based on the actor-network theory, Kopylec et al [37] explored the critical relationship between physical and network infrastructure, and demonstrated the results of situational awareness through visual cascading.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…With aspect to the multidisciplinary integration, Jajodia et al [39] conducted the research in relation to the questions and methods of network situational awareness in 2010 with an excellent conclusion and analyzed the key problem of the network situational awareness, as well as summarizes the main reasons for the lack of network situational awareness. Tadda and Salerno [16], Giacobe [40], and Schreiber-Ehle and Koch [42] inquired into the application process of JDL model in the field of situational awareness, especially in literature [40] for the favorable induction and summary of the data source information at level 0/1 in JDL model. In addition, Klein et al [41] and Vincent [45] et al applied the OODA loop model [15] to the network situational awareness and some stages in the model are prerequisites for others.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…The JDL Data Fusion Process Model [4] provided the basis for treating the network security data as sensor output in a fusion system [5]. First, we extracted entities, generally as computers by IP address, and applied the alert or log entry as properties of those entities to create Level 1 Fusion (entity-level refinement).…”
Section: Log File Parsing In Perlmentioning
confidence: 99%