{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:37:27Z","timestamp":1777567047152,"version":"3.51.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319527260","type":"print"},{"value":"9783319527277","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52727-7_11","type":"book-chapter","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T08:32:01Z","timestamp":1487061121000},"page":"92-103","source":"Crossref","is-referenced-by-count":13,"title":["Framework of Cyber Attack Attribution Based on Threat Intelligence"],"prefix":"10.1007","author":[{"given":"Li","family":"Qiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Yang","family":"Zeming","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Liu","family":"Baoxu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jiang","family":"Zhengwei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Yan","family":"Jian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,2,15]]},"reference":[{"key":"11_CR1","unstructured":"Trend Micro. Targetted Attacks (2016). http:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/targeted-attacks"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Wheeler, D.A., Larsen, G.N.: Techniques for cyber attack attribution. No. IDA-P-3792. Institute for Defense Analyses, Alexandria, VA (2003)","DOI":"10.21236\/ADA468859"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ryu, J., Na, J.: Security requirement for cyber attack traceback. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, vol. 2. IEEE (2008)","DOI":"10.1109\/NCM.2008.188"},{"key":"11_CR4","unstructured":"Hunker, J., Hutchinson, B., Margulies, J.: Role and challenges for sufficient cyber-attack attribution. In: Institute for Information Infrastructure Protection, pp. 5\u201310 (2008)"},{"key":"11_CR5","unstructured":"Tony Code. Attributions and Arrests: Lessons from Chinese Hacker (2015). https:\/\/www.fireeye.com\/blog\/executive-perspective\/2015\/12\/attributions_andarr.html"},{"key":"11_CR6","unstructured":"Gartner. Definition: Threat Intelligence (2013). https:\/\/www.gartner.com\/doc\/2487216\/definition-threat-intelligence"},{"key":"11_CR7","unstructured":"Gervais, P.: Nine Cyber Security Trends for 2016 (2015). http:\/\/www.prweb.com\/releases\/2015\/12\/prweb13125922.htm"},{"issue":"7","key":"11_CR8","first-page":"24","volume":"83","author":"JA Tirpak","year":"2000","unstructured":"Tirpak, J.A.: Find, fix, track, target, engage, assess. Air Force Mag. 83(7), 24\u201329 (2000)","journal-title":"Air Force Mag."},{"key":"11_CR9","unstructured":"U.S. Department of Defence. Joint Publication 3-60 Joint Targeting (2007). http:\/\/www.bits.de\/NRANEU\/others\/jp-doctrine\/jp3_60(07).pdf"},{"key":"11_CR10","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Leading Issues in Information Warfare and Security Research, vol. 1, p. 80 (2011)"},{"key":"11_CR11","unstructured":"Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. In: Center for Cyber Intelligence Analysis and Threat Research, Hanover, MD (2013)"},{"issue":"1-2","key":"11_CR12","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/01402390.2014.977382","volume":"38","author":"T Rid","year":"2015","unstructured":"Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1-2), 4\u201337 (2015)","journal-title":"J. Strateg. Stud."},{"key":"11_CR13","unstructured":"Kaspersky. Kaspersky Lab Technology Leadership (2014). http:\/\/www.kaspersky.com\/other\/custom-html\/b2b-ddos-prevention\/pdf\/kaspersky-technology-leadership.pdf"},{"key":"11_CR14","unstructured":"Kaspersky. Kaspersky Security Intelligence Services (2014). http:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/Kaspersky_Security_Intelligence_Services_Threat_Intelligence_Services.pdf"},{"key":"11_CR15","unstructured":"FireEye. FireEye Threat Intelligence Engine (2015). https:\/\/www.fireeye.com\/products\/dynamic-threat-intelligence\/threat-intelligence-engine.html"},{"key":"11_CR16","unstructured":"FireEye. FireEye Intelligence Center (2015). https:\/\/www.fireeye.com\/content\/dam\/fireeye-www\/global\/en\/products\/pdfs\/ds-fireeye-intelligence-center.pdf"},{"key":"11_CR17","unstructured":"Dell SecureWorks. Ever-Evolving Security Threat Landscape (2014). http:\/\/www.isaca.org\/chapters3\/Atlanta\/AboutOurChapter\/Documents\/ISACAATL-062014-EverevolvingSecurityThreatLandscape.pdf"},{"key":"11_CR18","unstructured":"Dell SecureWorks. Counter Threat Platform (2016). https:\/\/www.secureworks.com\/capabilities\/counter-threat-platform"},{"key":"11_CR19","unstructured":"IBM Security. IBM X-Force Threat Intelligence (2016). http:\/\/www-03.ibm.com\/security\/xforce\/"},{"issue":"5","key":"11_CR20","first-page":"773","volume":"10","author":"L Qiang","year":"2016","unstructured":"Qiang, L., et al.: A reasoning method of cyber-attack attribution based on threat intelligence. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(5), 773\u2013777 (2016)","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52727-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T13:21:45Z","timestamp":1568812905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52727-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319527260","9783319527277"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52727-7_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}