{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:35:15Z","timestamp":1758702915775},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319933719"},{"type":"electronic","value":"9783319933726"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93372-6_44","type":"book-chapter","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T07:08:26Z","timestamp":1528873706000},"page":"401-407","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology"],"prefix":"10.1007","author":[{"given":"Nima","family":"Asadi","sequence":"first","affiliation":[]},{"given":"Aunshul","family":"Rege","sequence":"additional","affiliation":[]},{"given":"Zoran","family":"Obradovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Rege, A., Obradovic, Z., Asadi, N., Singer, B., Masceri, N.: A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies. In: 2017 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1\u20137. IEEE, June 2017","DOI":"10.1109\/CyberSA.2017.8073398"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-60240-0_16","volume-title":"Social, Cultural, and Behavioral Modeling","author":"A Rege","year":"2017","unstructured":"Rege, A., Obradovic, Z., Asadi, N., Parker, E., Masceri, N., Singer, B., Pandit, R.: Using a real-time cybersecurity exercise case study to understand temporal characteristics of cyberattacks. In: Lee, D., Lin, Y.-R., Osgood, N., Thomson, R. (eds.) SBP-BRiMS 2017. LNCS, vol. 10354, pp. 127\u2013132. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60240-0_16"},{"key":"44_CR3","unstructured":"Cloppert, M.: Security Intelligence: Attacking the Cyber Kill Chain (2009). \nhttp:\/\/digital-forensics.sans.org\/blog\/2009\/10\/14\/security-intelligence-attacking-the-kill-chain\n\n. Accessed 2 Feb 2014"},{"key":"44_CR4","unstructured":"Colbaugh, R., Glass, K.: Proactive Defense for Evolving Cyber Threats. Sandia National Laboratories [SAND2012-10177] (2012). \nhttps:\/\/fas.org\/irp\/eprint\/proactive.pdf\n\n. Accessed 15 Feb 2017"},{"key":"44_CR5","volume-title":"Environmental Criminology and Crime Analysis","author":"B Leclerc","year":"2016","unstructured":"Leclerc, B.: Crime scripts. In: Wortley, R., Townsley, M. (eds.) Environmental Criminology and Crime Analysis. Routledge, Abingdon (2016)"},{"issue":"1","key":"44_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s00265-007-0445-8","volume":"62","author":"J Krause","year":"2007","unstructured":"Krause, J., Croft, D.P., James, R.: Social network theory in the behavioural sciences: potential applications. Behav. Ecol. Sociobiol. 62(1), 15\u201327 (2007)","journal-title":"Behav. Ecol. Sociobiol."},{"key":"44_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/0-387-25465-X_15","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"L Rokach","year":"2005","unstructured":"Rokach, L., Maimon, O.: Clustering methods. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 321\u2013352. Springer, Boston (2005). \nhttps:\/\/doi.org\/10.1007\/0-387-25465-X_15"},{"key":"44_CR8","unstructured":"Schneider, R.: Survey of peaks\/valleys identification in time series. Department of Informatics, University of Zurich, Switzerland (2011)"},{"key":"44_CR9","unstructured":"Ellens, W., Kooij, R.E.: Graph measures and network robustness. arXiv preprint \narXiv:1311.5064\n\n (2013)"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93372-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T09:08:19Z","timestamp":1528880899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93372-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319933719","9783319933726"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93372-6_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}