{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:43:40Z","timestamp":1761709420654,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811077951"},{"type":"electronic","value":"9789811077968"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7796-8_3","type":"book-chapter","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T01:14:01Z","timestamp":1515028441000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats"],"prefix":"10.1007","author":[{"given":"Seung-Jun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seok-Won","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"3_CR1","unstructured":"Darren, A., Paul, B., Chui, C.F., Gary S.: WorldWide infrastructure security report, Arbor networks special report vol. XII (2017)"},{"key":"3_CR2","unstructured":"Ponemon Institute: 2011 Cost of Data Breach Study, US (2012)"},{"key":"3_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-662-44208-1_22","volume-title":"ICT and Society","author":"F Mouton","year":"2014","unstructured":"Mouton, F., Leenen, L., Malan, M.M., Venter, H.S.: Towards an ontological model defining the social engineering domain. In: Kimppa, K., Whitehouse, D., Kuusela, T., Phahlamohlaka, J. (eds.) HCC 2014. IAICT, vol. 431, pp. 266\u2013279. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44208-1_22"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Widdowson, A.J., Goodliff, P.B.: CHEAT, an approach to incorporating human factors in cyber security assessments. In: System Safety and Cyber-Security Conference (2015)","DOI":"10.1049\/cp.2015.0298"},{"key":"3_CR5","unstructured":"Harley, D.: Re-floating the titanic: Dealing with social engineering attacks. In: European Institute for Computer Antivirus Research (1998)"},{"key":"3_CR6","unstructured":"Laribee, L.: Development of methodical social engineering taxonomy project. Msc, Naval Postgraduate School, Monterey, California, June 2006"},{"issue":"10","key":"3_CR7","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1080\/0144929X.2013.763860","volume":"32","author":"P Tetri","year":"2013","unstructured":"Tetri, P., Vuorinen, J.: Dissecting social engineering. Behav. Inform. Technol. 32(10), 1014\u20131023 (2013)","journal-title":"Behav. Inform. Technol."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Mouton, F., Leenen, L., Malan, M.M., Venter, H.S.: Towards an ontological model defining the social engineering domain. In: 11th Human Choice and Computers International Conference, Turku, Finland, July 2014, pp. 266\u2013279 (2014)","DOI":"10.1007\/978-3-662-44208-1_22"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Kim, B.J., Lee, S.W.: Analytical study of cognitive layered approach for understanding security requirements using problem domain ontology. In: 23rd Asia-Pacific Software Engineering Conference (APSEC), pp. 1530\u20131362 (2016)","DOI":"10.1109\/APSEC.2016.024"},{"key":"3_CR10","unstructured":"Common Criteria, Part 1: Introduction and general model in Common Criteria for Information Technology Security Evaluation, Common Criteria, pp. 38\u201344 (2012)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Lee, S.-W., Gandhi, R., Muthuranjan, D., Yavagal, D., Gail-Joon, A.: Building problem domain ontology from security requirements in regulatory documents. In: Workshop on Software Engineering for Secure Systems, New York (2006)","DOI":"10.1145\/1137627.1137635"},{"key":"3_CR12","unstructured":"NIST: Managing Information Security Risk: Organisation, Mission, and Information System View. National Institute of Standards and Technology, March 2011"},{"key":"3_CR13","unstructured":"Beth, E.B., McRee, R., O\u2019Connor, T.J.: Assessing outbound Traffic to Uncover Advanced Persistent Threat. SANS Technology Institute (2011)"},{"key":"3_CR14","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., et al.: Analysis of high volumes of network traffic for Advanced Persistent Threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Niu, W., et al.: Identifying APT Malware Domain Based on Mobile DNS Logging. In: Mathematical Problems in Engineering, vol. 2017 (2017)","DOI":"10.1155\/2017\/4916953"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering for Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7796-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T01:14:59Z","timestamp":1515028499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7796-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811077951","9789811077968"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7796-8_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}