{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:04:53Z","timestamp":1756897493299,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140384"},{"type":"electronic","value":"9783319140391"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14039-1_8","type":"book-chapter","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T10:58:09Z","timestamp":1428577089000},"page":"151-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cyber Attribution: An Argumentation-Based Approach"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Shakarian","sequence":"first","affiliation":[]},{"given":"Gerardo I.","family":"Simari","sequence":"additional","affiliation":[]},{"given":"Geoffrey","family":"Moores","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Parsons","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,10]]},"reference":[{"key":"8_CR1","unstructured":"Shadows in the Cloud: Investigating Cyber Espionage 2.0. Tech. rep., Information Warfare Monitor and Shadowserver Foundation (2010)"},{"key":"8_CR2","unstructured":"APT1: Exposing one of China\u2019s cyber espionage units. Mandiant (tech. report) (2013)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Altheide, C.: Digital Forensics with Open Source Tools. Syngress (2011)","DOI":"10.1016\/B978-1-59749-586-8.00001-7"},{"key":"8_CR4","unstructured":"Dekhtyar, A., Dekhtyar, M.I., Subrahmanian, V.S.: Temporal probabilistic logic programs. In: ICLP 1999, pp.\u00a0109\u2013123. The MIT Press, Cambridge, MA, USA (1999)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming andn-person games. Artif. Intell.77, pp.\u00a0321\u2013357 (1995)","DOI":"10.1016\/0004-3702(94)00041-X"},{"key":"8_CR6","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier Version 1.4. Symantec Corporation (2011)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Garc\u00eda, A.J., Simari, G.R.: Defeasible logic programming: An argumentative approach. TPLP4(1\u20132), 95\u2013138 (2004)","DOI":"10.1017\/S1471068403001674"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Hansson, H., Jonsson, B.: A logic for reasoning about time and probability. Formal Aspects of Computing6, 512\u2013535 (1994)","DOI":"10.1007\/BF01211866"},{"key":"8_CR9","unstructured":"Heuer, R.J.: Psychology of Intelligence Analysis. Center for the Study of Intelligence (1999)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Khuller, S., Martinez, M.V., Nau, D.S., Sliva, A., Simari, G.I., Subrahmanian, V.S.: Computing most probable worlds of action probabilistic logic programs: scalable estimation for 1030,000worlds. AMAI51(2\u20134), 295\u2013331 (2007)","DOI":"10.1007\/s10472-008-9089-2"},{"key":"8_CR11","unstructured":"Langner, R.: Matching Langner Stuxnet analysis and Symantic dossier update. Langner Communications GmbH (2011)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd Edition. Springer (1987)","DOI":"10.1007\/978-3-642-83189-8"},{"key":"8_CR13","unstructured":"Martinez, M.V., Garc\u00eda, A.J., Simari, G.R.: On the use of presumptions in structured defeasible reasoning. In: Proc. of COMMA, pp.\u00a0185\u2013196 (2012)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Nilsson, N.J.: Probabilistic logic. Artif. Intell.28(1), 71\u201387 (1986)","DOI":"10.1016\/0004-3702(86)90031-7"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Rahwan, I., Simari, G.R.: Argumentation in Artificial Intelligence. Springer (2009)","DOI":"10.1007\/978-0-387-98197-0"},{"key":"8_CR16","unstructured":"Reggia, J.A., Peng, Y.: Abductive inference models for diagnostic problem-solving. Springer-Verlag New York, Inc., New York, NY, USA (1990)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Shakarian, P., Parker, A., Simari, G.I., Subrahmanian, V.S.: Annotated probabilistic temporal logic. TOCL12(2), 14 (2011)","DOI":"10.1145\/1877714.1877720"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Shakarian, P., Simari, G.I., Subrahmanian, V.S.: Annotated probabilistic temporal logic: Approximate fixpoint implementation. ACM Trans. Comput. Log.13(2), 13 (2012)","DOI":"10.1145\/2159531.2159535"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Shakarian, P., Shakarian, J., Ruef, A.: Introduction to Cyber-Warfare: A Multidisciplinary Approach. Syngress (2013)","DOI":"10.1016\/B978-0-12-407814-7.09987-5"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Shakarian, P., Simari, G.I., Falappa, M.A.: Belief revision in structured probabilistic argumentation. In: Proceedings of FoIKS, pp.\u00a0324\u2013343 (2014)","DOI":"10.1007\/978-3-319-04939-7_16"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Simari, G.R., Loui, R.P.: A mathematical treatment of defeasible reasoning and its implementation. Artif. Intell.53(2-3), 125\u2013157 (1992)","DOI":"10.1016\/0004-3702(92)90069-A"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Simari, G.I., Martinez, M.V., Sliva, A., Subrahmanian, V.S.: Focused most probable world computations in probabilistic logic programs. AMAI64(2\u20133), 113\u2013143 (2012)","DOI":"10.1007\/s10472-012-9285-y"},{"key":"8_CR23","unstructured":"Spitzner, L.: Honeypots: Catching the Insider Threat. In: Proc. of ACSAC 2003, pp.\u00a0170\u2013179. IEEE Computer Society (2003)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Stolzenburg, F., Garc\u00eda, A., Ches\u00f1evar, C.I., Simari, G.R.: Computing Generalized Specificity. Journal of Non-Classical Logics13(1), 87\u2013113 (2003)","DOI":"10.3166\/jancl.13.87-113"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Thonnard, O., Mees, W., Dacier, M.: On a multicriteria clustering approach for attack attribution. SIGKDD Explorations12(1), 11\u201320 (2010)","DOI":"10.1145\/1882471.1882474"}],"container-title":["Advances in Information Security","Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14039-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:39:00Z","timestamp":1676936340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14039-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319140384","9783319140391"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14039-1_8","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"10 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}