{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:56:22Z","timestamp":1726059382910},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030352301"},{"type":"electronic","value":"9783030352318"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35231-8_51","type":"book-chapter","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T19:30:38Z","timestamp":1573846238000},"page":"696-711","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TOM: A Threat Operating Model for Early Warning of Cyber Security Threats"],"prefix":"10.1007","author":[{"given":"Tao","family":"Bo","sequence":"first","affiliation":[]},{"given":"Yue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Can","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunwei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"unstructured":"Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, CEUR Workshop Proceedings, vol. 966, pp. 49\u201356 (2012)","key":"51_CR1"},{"doi-asserted-by":"crossref","unstructured":"Sharma, A.C., et al.: Building a social dimensional threat model from current and historic events of cyber attacks. In: 2010 IEEE Second International Conference on Social Computing (2010)","key":"51_CR2","DOI":"10.1109\/SocialCom.2010.145"},{"key":"51_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.inffus.2007.06.002","volume":"10","author":"SJ Yang","year":"2009","unstructured":"Yang, S.J., et al.: High level information fusion for tracking and projection of multistage cyber attacks. Inf. Fusion 10, 107\u2013121 (2009)","journal-title":"Inf. Fusion"},{"unstructured":"Ingle, J.: Organizing intelligence to respond to network intrusions and attacks. In: Briefing for the DoD Information Assurance Symposium, Nashville, TN (2010)","key":"51_CR4"},{"doi-asserted-by":"crossref","unstructured":"Burger, E.W., et al.: Taxonomy model for cyber threat intelligence information exchange technologies. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pp. 51\u201360. ACM, Scottsdale (2014)","key":"51_CR5","DOI":"10.1145\/2663876.2663883"},{"unstructured":"Mateski, M., et al.: Cyber threat metrics, Sandia National Laboratories (2012)","key":"51_CR6"},{"key":"51_CR7","first-page":"90","volume":"3","author":"W Wang","year":"2012","unstructured":"Wang, W.: How the small and medium-sized enterprises \u2019owners\u2019 credit features affect the enterprises\u2019 credit default behavior. J. Bus. Manage. Econ. 3, 90\u201395 (2012)","journal-title":"J. Bus. Manage. Econ."},{"doi-asserted-by":"crossref","unstructured":"Mundie, D.A., Ruefle, R.: Building an incident management body of knowledge. In: 2012 Seventh International Conference on Availability, Reliability and Security (2012)","key":"51_CR8","DOI":"10.1109\/ARES.2012.83"},{"key":"51_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1002\/acp.1087","volume":"19","author":"GD Bond","year":"2005","unstructured":"Bond, G.D., Lee, A.Y.: Language of lies in prison: linguistic classification of prisoners\u2019 truthful and deceptive natural language. Appl. Cognitive Psychol. 19, 313\u2013329 (2005)","journal-title":"Appl. Cognitive Psychol."},{"unstructured":"Barnum, S.: Standardizing cyber threat intelligence information with the structured threat information eXpression (STIX\u2122), MITRE Corporation (2012)","key":"51_CR10"},{"key":"51_CR11","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1016\/j.jbankfin.2004.04.008","volume":"29","author":"RM Stein","year":"2005","unstructured":"Stein, R.M.: The relationship between default prediction and lending profits: integrating ROC analysis and loan pricing. J. Banking Finan. 29, 1213\u20131236 (2005)","journal-title":"J. Banking Finan."},{"unstructured":"Cohen, W.W., Ravikumar, P., Fienberg, S.E.: A comparison of string distance metrics for name-matching tasks. In: KDD Workshop on Data Cleaning and Object Consolidation, pp. 73\u201378 (2003)","key":"51_CR12"},{"unstructured":"Shiva, S., Simmons, C., Ellis, C., et al.: AVOIDIT: a cyber attack taxonomy (2009)","key":"51_CR13"},{"unstructured":"Burger, E.: A Taxonomy for CyberISE Technology Evaluation. Georgetown University (2014)","key":"51_CR14"},{"key":"51_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-319-94268-1_28","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Bin Lv","year":"2018","unstructured":"Lv, B., Wang D., Wang Y.: A hybrid model based on multi-dimensional features for insider threat detection. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 333\u2013334 (2018)"},{"key":"51_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/b104908","volume-title":"Managing Cyber Threats: Issues, Approaches, and Challenges","author":"V Kumar","year":"2005","unstructured":"Kumar, V., Srivastava, J., Lazarevic, A.: Managing Cyber Threats: Issues, Approaches, and Challenges. Springer-Verlag, New York (2005). \nhttps:\/\/doi.org\/10.1007\/b104908"},{"doi-asserted-by":"crossref","unstructured":"Paredesoliva-Oliva, I., Castell-Uroz, I., Barlet-Ros, P., Dimitropoulos, X., Sol\u00e9-Pareta, J.: Practical anomaly detection based on classifying frequent traffic patterns. In: International Conference on Computer Communications, pp. 49\u201354 (2012)","key":"51_CR17","DOI":"10.1109\/INFCOMW.2012.6193518"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35231-8_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T19:42:37Z","timestamp":1573846957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35231-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030352301","9783030352318"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35231-8_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adma2019.neusoft.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"170","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}