{"_id":{"_str":"535ed25a97e559e82100046f"},"__v":2,"authorIDs":[],"author_short":["Johansson, F."],"bibbaseid":"johansson-abayesiannetworkapproachtothreatevaluationwithapplicationtoanairdefensescenario","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Johansson"],"firstnames":["Fredrik"],"suffixes":[]}],"keywords":"Bayesian Network-based Security Analysis","title":"A Bayesian network approach to threat evaluation with application to an air defense scenario","volume":"0","bibtex":"@article{Johansson,\nauthor = {Johansson, Fredrik},\nkeywords = {Bayesian Network-based Security Analysis},\ntitle = {{A Bayesian network approach to threat evaluation with application to an air defense scenario}},\nvolume = {0}\n}\n","author_short":["Johansson, F."],"key":"Johansson","id":"Johansson","bibbaseid":"johansson-abayesiannetworkapproachtothreatevaluationwithapplicationtoanairdefensescenario","role":"author","urls":{},"keyword":["Bayesian Network-based Security Analysis"],"downloads":0},"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":["bayesian network-based security analysis"],"search_terms":["bayesian","network","approach","threat","evaluation","application","air","defense","scenario","johansson"],"title":"A Bayesian network approach to threat evaluation with application to an air defense scenario","year":null,"dataSources":["jGrSs2aYARmRcupKy"]}