{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T19:51:35Z","timestamp":1778183495516,"version":"3.51.4"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research at King Saud University through the Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3087109","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T12:47:50Z","timestamp":1623156470000},"page":"94318-94337","source":"Crossref","is-referenced-by-count":89,"title":["Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8055-9274","authenticated-orcid":false,"given":"Abel","family":"Yeboah-Ofori","sequence":"first","affiliation":[]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Sin Wee","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1954-1950","authenticated-orcid":false,"given":"Zia Ush","family":"Shamszaman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5302-1150","authenticated-orcid":false,"given":"Khan","family":"Muhammad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3256-3233","authenticated-orcid":false,"given":"Meteb","family":"Altaf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5343-8370","authenticated-orcid":false,"given":"Mabrook S.","family":"Al-Rakhami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref38","first-page":"10","article-title":"Classification of malware attacks using machine learning in decision tree","volume":"11","author":"yeboah-ofori","year":"2020","journal-title":"IJS"},{"key":"ref33","first-page":"1009","article-title":"Cloud with a chance of breach: Forecasting cyber security incidents","author":"liu","year":"2015","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref32","first-page":"1299","article-title":"Risk teller: Predicting the risk of cyber incidents","author":"bilge","year":"2017","journal-title":"Proc CCS"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0007309302300237"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019225"},{"key":"ref37","author":"boschetti","year":"2016","journal-title":"Python Data Science Essentials"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT47925.2019.00012"},{"key":"ref35","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression","volume":"1","author":"barnum","year":"2014"},{"key":"ref34","year":"2018","journal-title":"Guide to cyber threat information sharing"},{"key":"ref10","year":"2020","journal-title":"Building a secure software supply chain"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2018.8548432"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-161"},{"key":"ref13","year":"2018","journal-title":"Framework for Improving Critical Infrastructure Cybersecurity Version 1 1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ADA610495"},{"key":"ref15","author":"ahlberg","year":"0","journal-title":"The Threat Intelligence Handbook"},{"key":"ref16","article-title":"Definition guide to cyber threat intelligence. Using knowledge about adversary to win the war against targeted attacks","author":"freidman","year":"2018"},{"key":"ref17","year":"2016","journal-title":"Cyber Threat Intelligence Designing Building and Operating an Effective Program"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT47925.2019.00019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2172\/1113394"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17249347"},{"key":"ref4","year":"2017","journal-title":"Exploring the opportunities and limitations of current Threat Intelligence Platforms VERSION 1 0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.053"},{"key":"ref3","article-title":"Supply chain in the software era","author":"woods","year":"2018","journal-title":"Scowcroft Center for Strategic and Security"},{"key":"ref6","year":"2019","journal-title":"Microsoft Malware Prediction"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3015026"},{"key":"ref5","author":"doerr","year":"2018","journal-title":"Cyber Threat Intelligences Standards&#x2014;A High Level Overview"},{"key":"ref8","year":"2018","journal-title":"Common Attack Pattern Enumeration and Classification Domain of Attack"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17781\/P002556"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030063"},{"key":"ref9","year":"2017","journal-title":"The Ten Most Critical Application Security Risks Creative Commons Attribution-Share Alike 4 0 International License"},{"key":"ref1","year":"2018","journal-title":"Example supply chain attacks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258167"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref24","first-page":"1","article-title":"Machine learning for power system disturbance and cyber-attack discrimination","author":"hink","year":"2014","journal-title":"Proc 7th Int Symp Resilient Control Syst (ISRCS)"},{"key":"ref23","article-title":"Classification of logs using machine learning","author":"villano","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2970074"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106658"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09448097.pdf?arnumber=9448097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:29Z","timestamp":1639770989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9448097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3087109","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}