{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:18:14Z","timestamp":1770279494960,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,4,7]],"date-time":"2018-04-07T00:00:00Z","timestamp":1523059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11042-018-5897-5","type":"journal-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T23:24:37Z","timestamp":1523057077000},"page":"3153-3170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Modified cyber kill chain model for multimedia service environments"],"prefix":"10.1007","volume":"78","author":[{"given":"Hyeob","family":"Kim","sequence":"first","affiliation":[]},{"given":"HyukJun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Kyung Kyu","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,7]]},"reference":[{"issue":"21","key":"5897_CR1","doi-asserted-by":"publisher","first-page":"22845","DOI":"10.1007\/s11042-017-4853-0","volume":"76","author":"M Alam","year":"2017","unstructured":"Alam M, Javed Q, Khan A et al (2017) Formal modeling and verification of security controls for multimedia systems in the cloud. Multimedia Tools Appl 76(21):22845\u201322870","journal-title":"Multimedia Tools Appl"},{"issue":"15","key":"5897_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"5897_CR3","unstructured":"Bejtlich R (2010) What Is APT and What Does It Want? TaoSecurity Blog. \n                    https:\/\/taosecurity.blogspot.kr\/2010\/01\/what-is-apt-and-what-does-it-want.html\n                    \n                  . Accessed 17 May 2017"},{"key":"5897_CR4","unstructured":"Cloppert M (2009) Security intelligence: attacking the cyber kill chain. SANS Computer Forensics Blog. \n                    https:\/\/digital-forensics.sans.org\/blog\/2009\/10\/14\/security-intelligence-attacking-the-kill-chain\n                    \n                  . Accessed 17 May 2017"},{"key":"#cr-split#-5897_CR5.1","unstructured":"3. Cloppert M (2009) Security Intelligence: Introduction"},{"key":"#cr-split#-5897_CR5.2","unstructured":"4. (pt1), SANS Computer Forensics Blog.   https:\/\/digital-forensics.sans.org\/blog\/2009\/07\/22\/security-intelligence-introduction-pt-1    . Accessed 17 May 2017"},{"key":"5897_CR6","unstructured":"Command Five Pty Ltd (2011) Advanced Persistent Threats: A Decade in Review. \n                    http:\/\/www.commandfive.com\/papers\/C5_APT_ADecadeInReview.pdf\n                    \n                  . Accessed 17 May 2017"},{"key":"5897_CR7","unstructured":"FireEye (2017) M-Trends 2017 Report. \n                    https:\/\/www.fireeye.com\/current-threats\/annual-threat-report\/mtrends.html\n                    \n                  . Accessed 17 May 2017"},{"key":"5897_CR8","unstructured":"Firstbrook P (2017) Market guide for endpoint detection and response solutions. Gartner"},{"key":"5897_CR9","unstructured":"Gartner (2011) Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020. \n                    http:\/\/www.gartner.com\/newsroom\/id\/2636073\n                    \n                  . Accessed 17 May 2017"},{"issue":"1","key":"5897_CR10","first-page":"80","volume":"1","author":"E Hutchins","year":"2011","unstructured":"Hutchins E, Cloppert M, Amin R (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Issues Inf Warf Secur Res 1(1):80\u2013106","journal-title":"Lead Issues Inf Warf Secur Res"},{"issue":"6","key":"5897_CR11","doi-asserted-by":"publisher","first-page":"3032","DOI":"10.5762\/KAIS.2013.14.6.3032","volume":"14","author":"CS Jung","year":"2013","unstructured":"Jung CS, Shin YT (2013) A study on verification of security threat and method of response for multimedia broadcasting and communication convergence services. J Korea Academia-Industrial Coop Soc 14(6):3032\u20133042","journal-title":"J Korea Academia-Industrial Coop Soc"},{"issue":"22","key":"5897_CR12","doi-asserted-by":"publisher","first-page":"14795","DOI":"10.1007\/s11042-015-2638-x","volume":"75","author":"H Kim","year":"2016","unstructured":"Kim H, Kim Y, Chang H (2016) Information security research classification for future multimedia environment. Multimedia Tools Appl 75(22):14795\u201314806","journal-title":"Multimedia Tools Appl"},{"issue":"20","key":"5897_CR13","doi-asserted-by":"publisher","first-page":"12779","DOI":"10.1007\/s11042-016-3503-2","volume":"75","author":"H Kim","year":"2016","unstructured":"Kim H, Park S, Chang H (2016) A gap analysis study between multimedia security research and education by meta data analysis. Multimedia Tools Appl 75(20):12779\u201312793","journal-title":"Multimedia Tools Appl"},{"key":"5897_CR14","unstructured":"Malone ST (2016) Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency. \n                    https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf\n                    \n                  . Accessed 17 May 2017"},{"key":"5897_CR15","unstructured":"Mandiant (2010) M-Trends 2010, The Advanced Persistent Threat. \n                    https:\/\/www2.fireeye.com\/WEB-2010-MNDT-RPT-M-Trends-2010_LP.html\n                    \n                  . Accessed 17 May 2017"},{"issue":"3","key":"5897_CR16","first-page":"75","volume":"71","author":"JF Moore","year":"1993","unstructured":"Moore JF (1993) Predators and prey: a new ecology of competition. Harv Bus Rev 71(3):75\u201383","journal-title":"Harv Bus Rev"},{"issue":"8","key":"5897_CR17","doi-asserted-by":"publisher","first-page":"14786","DOI":"10.3390\/s140814786","volume":"14","author":"B Ndibanje","year":"2014","unstructured":"Ndibanje B, Lee HJ, Lee SG (2014) Security analysis and improvements of authentication and access control in the internet of things. Sensors 14(8):14786\u201314805","journal-title":"Sensors"},{"key":"5897_CR18","doi-asserted-by":"crossref","unstructured":"Oracevic A, Dilek S, Ozdemir S (2017) Security in internet of things: A survey. In Networks, Computers and Communications (ISNCC), 2017 International Symposium on (pp. 1\u20136). IEEE","DOI":"10.1109\/ISNCC.2017.8072001"},{"key":"5897_CR19","unstructured":"Ouellet E, McShane I, Litan A (2017) Magic quadrant for endpoint protection platforms. Gartner"},{"issue":"11","key":"5897_CR20","doi-asserted-by":"publisher","first-page":"6059","DOI":"10.1007\/s11042-014-2393-4","volume":"75","author":"W Park","year":"2016","unstructured":"Park W, Na O, Chang H (2016) An exploratory research on advanced smart media security design for sustainable intelligence information system. Multimedia Tools Appl 75(11):6059\u20136070","journal-title":"Multimedia Tools Appl"},{"key":"5897_CR21","unstructured":"PWC (2015) Key Findings from the 2015 US State of Cybercrime Survey. \n                    http:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/assets\/2015-us-cybercrime-survey.pdf\n                    \n                  . Accessed 17 May 2017"},{"key":"5897_CR22","unstructured":"Reidy P (2013) Combating the Insider Threat at the FBI: Real World Lessons Learned. \n                    https:\/\/media.blackhat.com\/us-13\/US-13-Reidy-Combating-the-Insider-Threat-At-The-FBI-Slides.pdf\n                    \n                  . Accessed 17 May 2017"},{"issue":"1","key":"5897_CR23","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/s11227-010-0447-6","volume":"65","author":"S Rho","year":"2013","unstructured":"Rho S, Yeo S-S (2013) Bridging the semantic gap in multimedia emotion\/mood recognition for ubiquitous computing environment. J Supercomput 65(1):274\u2013286","journal-title":"J Supercomput"},{"key":"5897_CR24","doi-asserted-by":"crossref","unstructured":"Rutherford JR, White GB (2016) Using an improved cybersecurity kill chain to develop an improved honey community. In System Sciences (HICSS), 2016 49th Hawaii International Conference on (pp. 2624\u20132632). IEEE","DOI":"10.1109\/HICSS.2016.329"},{"key":"5897_CR25","unstructured":"Ryan J (2011) Leading issues in information warfare and security research. Academic Conferences Limited"},{"issue":"4","key":"5897_CR26","first-page":"16","volume":"41","author":"H Ryu","year":"2014","unstructured":"Ryu H, Jeong S, Kwon T (2014) Advanced persistent threats: new paradigm of the evolving threat. The Magazine of the IEIE 41(4):16\u201330","journal-title":"The Magazine of the IEIE"},{"key":"5897_CR27","doi-asserted-by":"crossref","unstructured":"Yoo T, Chang H (2013) The IT convergence framework design in the internet of things environment. EURASIP J Wirel Commun Netw 2013(1):53","DOI":"10.1186\/1687-1499-2013-53"},{"issue":"3","key":"5897_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2011.5772059","volume":"25","author":"L Zhou","year":"2011","unstructured":"Zhou L, Chao HC (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35\u201340","journal-title":"IEEE Netw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5897-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5897-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5897-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T00:17:49Z","timestamp":1554596269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5897-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,7]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["5897"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5897-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,7]]},"assertion":[{"value":"10 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}