[
    {
        "key": "6GESE22U",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/6GESE22U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/6GESE22U",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/MWTFAH7D",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "6GESE22U",
            "version": 1,
            "parentItem": "MWTFAH7D",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Scenario-Based E-Learning: A Step Beyond Traditional E-Learning - 2002 - ASTD",
            "accessDate": "2010-09-17T19:59:26Z",
            "url": "http://www.astd.org/LC/2002/0502_kindley.htm",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "0502_kindley.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:22:29Z",
            "dateModified": "2010-09-17T21:22:29Z"
        }
    },
    {
        "key": "3F77KAVJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/3F77KAVJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/3F77KAVJ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/MWTFAH7D",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "3F77KAVJ",
            "version": 1,
            "parentItem": "MWTFAH7D",
            "itemType": "note",
            "note": "<p><strong>Randall W. Kindley</strong> discusses the two types of e_learning - traditional e-learning and scenario-based e-learning. Scenario based e- learning is a new way of learning in which a scenario is given and students are asked to make decision. Scenario based e-learning must involve a real-worl situation and open ended leaner- instructor feedback.</p>",
            "tags": [
                {
                    "tag": "Scenario-based learning"
                }
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:22:29Z",
            "dateModified": "2010-09-17T21:22:29Z"
        }
    },
    {
        "key": "MWTFAH7D",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/MWTFAH7D",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/MWTFAH7D",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Randall, Kindley",
            "parsedDate": "2010",
            "numChildren": 2
        },
        "data": {
            "key": "MWTFAH7D",
            "version": 1,
            "itemType": "webpage",
            "title": "Scenario-Based E-Learning: A Step Beyond Traditional E-Learning - 2002 - ASTD",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Randall, Kindley"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "2010",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.astd.org/LC/2002/0502_kindley.htm",
            "accessDate": "2010-09-17T19:59:25Z",
            "shortTitle": "SB E-Learning",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "DSDM3B2F"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:22:29Z",
            "dateModified": "2010-09-17T21:22:29Z"
        }
    },
    {
        "key": "H96RVZF4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/H96RVZF4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/H96RVZF4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/RA5G8SK9",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "H96RVZF4",
            "version": 1,
            "parentItem": "RA5G8SK9",
            "itemType": "note",
            "note": "The dimensions and consequences of college student attrition and features of institutional action to deal with attrition are discussed. Patterns of student departure from individual colleges as opposed to permanent college withdrawal are addressed. After synthesizing the research on multiple causes of student leaving, a theory of student departure from college is presented based on the work of Emile Durkheim and Arnold Van Gennep. The theory proposes that student departure may serve as a barometer of the social and intellectual health of college life as much as of the students' experiences at the college. The quality of faculty-student interaction and the student's integration into the school are central factors in student attrition. Attention is directed to features of retention programs, including the time of college actions and variations in policy necessary for different types of students and colleges. It is suggested that effective retention lies in the college's commitment to students. The content, structure, and evaluation methods for assessment of student retention and departure are considered, along with the use of assessment information for developing effective retention programs. (SW)",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:22:27Z",
            "dateModified": "2010-09-17T21:22:27Z"
        }
    },
    {
        "key": "RA5G8SK9",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/RA5G8SK9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/RA5G8SK9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Tinto",
            "parsedDate": "1987-03-24",
            "numChildren": 1
        },
        "data": {
            "key": "RA5G8SK9",
            "version": 1,
            "itemType": "book",
            "title": "Leaving College: Rethinking the Causes and Cures of Student Attrition.",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Vincent",
                    "lastName": "Tinto"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "March 24, 1987",
            "publisher": "University of Chicago Press, 5801 S. Ellis Avenue, Chicago, IL 60637 ($19.95).",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "ISBN-0-226-80446-1",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Leaving College",
            "language": "",
            "libraryCatalog": "ERIC",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "DSDM3B2F"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:22:27Z",
            "dateModified": "2010-09-17T21:22:27Z"
        }
    },
    {
        "key": "K66NX4HG",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/K66NX4HG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/K66NX4HG",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/XVJ4URRN",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "K66NX4HG",
            "version": 1,
            "parentItem": "XVJ4URRN",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "DTIC Snapshot",
            "accessDate": "2010-09-17T20:52:39Z",
            "url": "http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA408853",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "oai.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:45Z",
            "dateModified": "2010-09-17T21:17:45Z"
        }
    },
    {
        "key": "XVJ4URRN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/XVJ4URRN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/XVJ4URRN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Lipson",
            "parsedDate": "2002-11",
            "numChildren": 1
        },
        "data": {
            "key": "XVJ4URRN",
            "version": 1,
            "itemType": "report",
            "title": "Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Howard F",
                    "lastName": "Lipson"
                }
            ],
            "abstractNote": "In the cyber world, the current state of the practice regarding the technical ability to track and trace Internet- based attacks is primitive at best. Sophisticated attacks can be almost impossible to trace to their true source using current practices. The anonymity enjoyed by today's cyber-attackers poses a grave threat to the global information society, the progress of an information-based international economy, and the advancement of global collaboration and cooperation in all areas of human endeavor. Part I of this report examines the current state of the Internet environment and the reasons why tracking and tracing cyber-attackers is so difficult. Part II examines some promising research on technical approaches that may greatly improve the ability to track and trace cyber-attackers to their source. Also discussed are some policy considerations with regard to privacy, information sharing, liability, and other policy issues that would be faced by the U. S. State Department in negotiating international agreements for cooperation and collaboration in the tracking and tracing of cyber-attacks. The report concludes with a closer look at technical and policy considerations for next-generation Internet protocols to enhance track and trace capabilities.",
            "reportNumber": "",
            "reportType": "",
            "institution": "",
            "place": "",
            "date": "2002-11",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA408853",
            "accessDate": "2010-09-17T20:52:37Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Tracking and Tracing Cyber-Attacks",
            "language": "",
            "libraryCatalog": "Defense Technical Information Center",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "*DATA PROCESSING SECURITY",
                    "type": 1
                },
                {
                    "tag": "*INTRUSION DETECTION(COMPUTERS)",
                    "type": 1
                },
                {
                    "tag": "COMPUTER COMMUNICATIONS",
                    "type": 1
                },
                {
                    "tag": "COMPUTER SYSTEMS MANAGEMENT AND STANDARDS",
                    "type": 1
                },
                {
                    "tag": "CYBERTERRORISM.",
                    "type": 1
                },
                {
                    "tag": "ELECTRONIC SECURITY",
                    "type": 1
                },
                {
                    "tag": "FOREIGN POLICY",
                    "type": 1
                },
                {
                    "tag": "INFORMATION EXCHANGE",
                    "type": 1
                },
                {
                    "tag": "INTERNATIONAL RELATIONS",
                    "type": 1
                },
                {
                    "tag": "POLICIES",
                    "type": 1
                }
            ],
            "collections": [
                "EV6NM5IT"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:45Z",
            "dateModified": "2010-09-17T21:17:45Z"
        }
    },
    {
        "key": "TDATMN5U",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/TDATMN5U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/TDATMN5U",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/5RFM27JF",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "TDATMN5U",
            "version": 1,
            "parentItem": "5RFM27JF",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "ACM Snapshot",
            "accessDate": "2010-09-17T20:25:55Z",
            "url": "http://portal.acm.org/citation.cfm?id=553614&dl=",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "citation.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:38Z",
            "dateModified": "2010-09-17T21:17:38Z"
        }
    },
    {
        "key": "5RFM27JF",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/5RFM27JF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/5RFM27JF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Liberti and Rappaport",
            "parsedDate": "1999",
            "numChildren": 1
        },
        "data": {
            "key": "5RFM27JF",
            "version": 1,
            "itemType": "book",
            "title": "Smart Antennas for Wireless Communications: IS-95 and Third Generation CDMA Applications",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Joseph C.",
                    "lastName": "Liberti"
                },
                {
                    "creatorType": "author",
                    "firstName": "Theodore S.",
                    "lastName": "Rappaport"
                }
            ],
            "abstractNote": "From the Book:PREFACE: Smart Antennas for Wireless CommunicationsIS-95 and Third Generation CDMA ApplicationsPrefaceThis text has been created to satisfy the growing demand for knowledge in two emerging areas: adaptive antennas (also known as smart antennas) and Code Division Multiple Access. CDMA was commercialized in the early 1990s by Qualcomm, Inc., a San Diego, California, company that pioneered the use of a classic military concept for the burgeoning cellular telephone industry. Adaptive arrays, first conceptualized in the 1960s with the birth of digital signal processing, only recently have become practical for deployment; the intense growth rates of wireless services around the world are beckoning for their commercial use.This text has been developed through years of research by the authors and their colleagues at the Mobile and Portable Radio Research Group of Virginia Tech and at Bell Communications Research. Our goal in creating this text is to provide fundamental and practical information for practicing engineers, students, and researchers in industry as well as in academia. To complement the book, the second author was asked by the Institute of Electrical and Electronics Engineers (IEEE) to provide a compendium of selected readings of key journal papers dedicated to the topic of smart antennas. The compendium, when used in conjunction with this text, provides a convenient single source of literature for use in classrooms or industry short courses.The material and organization of this book stemmed from the first author's 1995 Ph.D. dissertation on the subject of CDMA and smart antennas. Since then, a great deal of work has transpired in the field, including the adoption oftheIS-95 J-STD-008 CDMA standard, the new 14,400 bps voice coder for Rate Set 2 channels, new methods and models for implementation and modeling of smart antennas in CDMA, and the stringent wireless E-911 position location requirement 125m, 67% of the time imposed by the Federal Communications Commission. We have worked diligently to include up-to-the-minute information in this text. The text is arranged into 10 chapters. Chapter 1 provides an overview of CDMA and smart antennas; it includes a glossary of terms and a fundamental treatment of synchronous and asynchronous CDMA. Antenna and propagation fundamentals, as they relate to CDMA systems, are also presented. Chapter 2 provides valuable practical information on the IS-95 J-STD-008 standard, and it provides in-depth descriptions of all of the CDMA channels. Also included is an actual link budget design for a PCS CDMA system. Chapter 3 provides fundamental material on adaptive antenna arrays and array theory. The concepts of beamforming, weighting vectors, and fixed-beam vs. adaptive beam antennas are covered. Chapter 4 applies this material to specific CDMA implementations that may be used for today's IS-95 and future CDMA systems. Chapter 5 combines the concepts of CDMA and adaptive antennas to derive analytical expressions that allow wireless system designers to predict the coverage and capacity gains that adaptive antennas provide in a multi-cell CDMA system. This chapter derives classic results that have led to system capacity predictions using CDMA with and without adaptive antennas.Chapter 6 provides an overview of multipath and Direction-Of-Arrival models for wireless channels. A host of propagation models which are useful for analysis and simulation of adaptive array algorithms are presented. Chapter 7 then describes complete details of one multipath propagation model, the Geometrically Based Single Bounce Elliptical Model, which provides complete characterization of a multipath environment in microcell/picocell applications. Chapter 8 describes optimal spatial filtering approaches that use both adaptive arrays and characteristics of the CDMA signals. Building on the fundamentals provided in Chapter 3, this chapter presents optimal methods that null interference while maximizing the carrier-to-noise ratio of a desired user. Chapter 9 describes the algorithmic techniques for determining the Direction-Of-Arrival (DOA) of a signal in a multi-user interference environment. Such capabilities will be required for position location techniques. Chapter 10 concludes this text with a thorough treatment of position location algorithms and approaches. Appendix A covers the derivation of the Gaussian Approximation and its many derivatives for spread spectrum systems. Other appendices provide information that engineers and educators may find useful.The authors wish to acknowledge the invaluable assistance, skill, and patience of Aurelia Scharnhorst, a research associate with Virginia Tech's Mobile and Portable Radio Research Group (MPRG), in formatting this text. The ingenuity and hard work of Zhigang Rong, Rias Muhamed, and George Mizusawa are represented in parts of Chapters 8, 9, and 10 of this book, as portions of their mastersâ theses have been used with their gracious permission. Other MPRG researchers who played an important role in building the knowledge base presented in this text are Rich Ertel, Kevin Krizman, Neal Patwari, Paulo Cardieri, and Tom Biedka. The authors would also like to thank Prof. M. Zoltowski of Purdue University, Prof. A. Paulraj of Stanford University, M. Feuerstein of Metawave, C. Thompson of Virginia Tech, and Prof. W. Tranter and Prof. B. Woerner of Virginia Techâs MPRG for their review of this text and encouragement to pursue this project. Kevin Sowerby of the University of Auckland, New Zealand also helped inspire this work during his 1997 sabbatical at MPRG.The authors would also like to thank Joe Wilkes, Paul Zablocky, and Shimon Moshavi of Bellcore, for valuable discussions regarding IS-95. Daniel Devasirvathm, Scott Seidel, and John Koshy provided insight and assistance that allowed the book to become a reality. This text is the product of funded research supported at Virginia Tech through the MPRG industrial affiliates program. It is our pleasure to bring this book to you, and we hope you find it useful.J. C. L., Jr.T. S. R.",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "1999",
            "publisher": "Prentice Hall PTR",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "0137192878",
            "DOI": "",
            "citationKey": "",
            "url": "http://portal.acm.org/citation.cfm?id=553614&dl=",
            "accessDate": "2010-09-17T20:25:53Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Smart Antennas for Wireless Communications",
            "language": "",
            "libraryCatalog": "ACM",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "DSDM3B2F",
                "EV6NM5IT"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:38Z",
            "dateModified": "2010-09-17T21:17:38Z"
        }
    },
    {
        "key": "TDKGSQU4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/TDKGSQU4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/TDKGSQU4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/TG5NC7SA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "TDKGSQU4",
            "version": 1,
            "parentItem": "TG5NC7SA",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Security Situation Assessment and Response Evaluation (SSARE)",
            "accessDate": "2010-09-17T20:54:24Z",
            "url": "http://www.computer.org/portal/web/csdl/doi/10.1109/DISCEX.2001.932233",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "DISCEX.2001.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:32Z",
            "dateModified": "2010-09-17T21:17:32Z"
        }
    },
    {
        "key": "MKXRHR3P",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/MKXRHR3P",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/MKXRHR3P",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/TG5NC7SA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "MKXRHR3P",
            "version": 1,
            "parentItem": "TG5NC7SA",
            "itemType": "note",
            "note": "Complete PDF document was either not available or accessible. Please make sure you're logged in to the digital library to retrieve the complete PDF document.",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:32Z",
            "dateModified": "2010-09-17T21:17:32Z"
        }
    },
    {
        "key": "TG5NC7SA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/TG5NC7SA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/TG5NC7SA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "'Ambrosio et al.",
            "parsedDate": "2001",
            "numChildren": 2
        },
        "data": {
            "key": "TG5NC7SA",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Security Situation Assessment and Response Evaluation (SSARE)",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Bruce D",
                    "lastName": "'Ambrosio"
                },
                {
                    "creatorType": "author",
                    "firstName": "Masami",
                    "lastName": "Takikawa"
                },
                {
                    "creatorType": "author",
                    "firstName": "Daniel",
                    "lastName": "Upper"
                },
                {
                    "creatorType": "author",
                    "firstName": "Julie",
                    "lastName": "Fitzgerald"
                },
                {
                    "creatorType": "author",
                    "firstName": "Suzanne",
                    "lastName": "Mahoney"
                }
            ],
            "abstractNote": "Abstract: Response to cyber attack is a decision made in the face of risk and uncertainty. Uncertainty, both in our understanding of the current situation and our capacity to predict exactly the results of alternate responses, requires the ability to entertain multiple hypotheses about the actual state of system security, attacker intent, and response effects. Risk management for catastrophic or near-catastrophic breaches of security or loss of service (either through system compromise or overly aggressive response)requires the evaluation of tradeoffs among competing objectives. Security Situation Assessment and Response Evaluation (SSARE) is a mixed-initiative computer software system for wide-area cyber attack detection, situation assessment, and response evaluation. SSARE is designed to detect a large-scale attack in progress, display an assessment of the situation, and identify effective responses, including automated context and risk-sensitive policy adaptations. The core of our technical approach is (1)development of attack, attacker, mission, systems, and infrastructure element models;(2) application of IET-developed information fusion and dynami situation assessment technology; and (3) decision-theoretic evaluation of responses.",
            "proceedingsTitle": "DARPA Information Survivability Conference and Exposition,",
            "conferenceName": "",
            "publisher": "IEEE Computer Society",
            "place": "Los Alamitos, CA, USA",
            "date": "2001",
            "eventPlace": "",
            "volume": "1",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "0387",
            "series": "",
            "seriesNumber": "",
            "DOI": "http://doi.ieeecomputersociety.org/10.1109/DISCEX.2001.932233",
            "ISBN": "0-7695-1212-7",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Computer Society",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "EV6NM5IT"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:32Z",
            "dateModified": "2010-09-17T21:17:32Z"
        }
    },
    {
        "key": "AI58H35N",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/AI58H35N",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/AI58H35N",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/A7XHX789",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "AI58H35N",
            "version": 1,
            "parentItem": "A7XHX789",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "SpringerLink - Abstract",
            "accessDate": "2010-09-17T20:51:55Z",
            "url": "http://www.springerlink.com/content/a2uya9gqlqjk442u/",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "a2uya9gqlqjk442u.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:28Z",
            "dateModified": "2010-09-17T21:17:28Z"
        }
    },
    {
        "key": "A7XHX789",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/A7XHX789",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/A7XHX789",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Debar et al.",
            "parsedDate": "2000",
            "numChildren": 1
        },
        "data": {
            "key": "A7XHX789",
            "version": 1,
            "itemType": "book",
            "title": "Recent Advances in Intrusion Detection",
            "creators": [
                {
                    "creatorType": "editor",
                    "firstName": "Hervé",
                    "lastName": "Debar"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Ludovic",
                    "lastName": "Mé"
                },
                {
                    "creatorType": "editor",
                    "firstName": "S. Felix",
                    "lastName": "Wu"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "1907",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2000",
            "publisher": "Springer Berlin Heidelberg",
            "place": "Berlin, Heidelberg",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "978-3-540-41085-0",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.springerlink.com/content/a2uya9gqlqjk442u/",
            "accessDate": "2010-09-17T20:51:54Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "CrossRef",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "EV6NM5IT"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:28Z",
            "dateModified": "2010-09-17T21:17:28Z"
        }
    },
    {
        "key": "SCF4S8TK",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/SCF4S8TK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/SCF4S8TK",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26321/items/TFUGWKTT",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "SCF4S8TK",
            "version": 1,
            "parentItem": "TFUGWKTT",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "DTIC Snapshot",
            "accessDate": "2010-09-17T21:13:20Z",
            "url": "http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA395300",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "oai.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:26Z",
            "dateModified": "2010-09-17T21:17:26Z"
        }
    },
    {
        "key": "TFUGWKTT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26321,
            "name": "Hassan_scenario-based learning",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hassan_scenario-based_learning",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26321/items/TFUGWKTT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hassan_scenario-based_learning/items/TFUGWKTT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 347079,
                "username": "ahassan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ahassan",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Vatis",
            "parsedDate": "2001-09-22",
            "numChildren": 1
        },
        "data": {
            "key": "TFUGWKTT",
            "version": 1,
            "itemType": "report",
            "title": "Cyber Attacks During the War on Terrorism: A Predictive Analysis",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Michael A",
                    "lastName": "Vatis"
                }
            ],
            "abstractNote": "This paper should be viewed as a clear warning to policymakers and security professionals. Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists responsible for the attack. This paper examines case studies of political conflicts that have led to attacks on cyber systems, such as the recent clashes between India and Pakistan, Israel and the Palestinians, and NATO and Serbia in Kosovo, and the tensions between the U.S. and China over the collision between a Chinese fighter plane and an American surveillance plane.",
            "reportNumber": "",
            "reportType": "",
            "institution": "",
            "place": "",
            "date": "2001-09-22",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA395300",
            "accessDate": "2010-09-17T21:13:17Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Cyber Attacks During the War on Terrorism",
            "language": "",
            "libraryCatalog": "Defense Technical Information Center",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "*COUNTERTERRORISM",
                    "type": 1
                },
                {
                    "tag": "*CYBERTERRORISM",
                    "type": 1
                },
                {
                    "tag": "ATTACK",
                    "type": 1
                },
                {
                    "tag": "CASE STUDIES",
                    "type": 1
                },
                {
                    "tag": "COMPUTER SYSTEMS MANAGEMENT AND STANDARDS",
                    "type": 1
                },
                {
                    "tag": "CYBERNETICS",
                    "type": 1
                },
                {
                    "tag": "IATAC COLLECTION",
                    "type": 1
                },
                {
                    "tag": "NATO",
                    "type": 1
                },
                {
                    "tag": "POLITICAL SCIENCE",
                    "type": 1
                },
                {
                    "tag": "PREDICTIONS",
                    "type": 1
                },
                {
                    "tag": "RETALIATION",
                    "type": 1
                },
                {
                    "tag": "SURVEILLANCE.",
                    "type": 1
                },
                {
                    "tag": "TERRORISTS",
                    "type": 1
                },
                {
                    "tag": "UNCONVENTIONAL WARFARE",
                    "type": 1
                },
                {
                    "tag": "UNITED STATES",
                    "type": 1
                }
            ],
            "collections": [
                "EV6NM5IT"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T21:17:26Z",
            "dateModified": "2010-09-17T21:17:26Z"
        }
    }
]