{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:45:58Z","timestamp":1769885158958,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Universitas Indonesia through the Hibah Publikasi Terindeks Internasional Kolaborasi Internasional 2023 Scheme","award":["NKB-820\/UN2.RST\/HKP.05.00\/2023"],"award-info":[{"award-number":["NKB-820\/UN2.RST\/HKP.05.00\/2023"]}]},{"name":"Lembaga Pengelola Dana Pendidikan (LPDP), Ministry of Finance, Indonesia"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2024.3524502","type":"journal-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:39:52Z","timestamp":1735673992000},"page":"28381-28397","source":"Crossref","is-referenced-by-count":2,"title":["ARKAIV: Predicting Data Exfiltration Using Supervised Machine Learning Based on Tactics Mapping From Threat Reports and Event Logs"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7621-0301","authenticated-orcid":false,"given":"Arif","family":"Rahman Hakim","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok City, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-4465","authenticated-orcid":false,"given":"Kalamullah","family":"Ramli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok City, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8282-1108","authenticated-orcid":false,"given":"Muhammad","family":"Salman","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok City, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2992-697X","authenticated-orcid":false,"given":"Bernardi","family":"Pranggono","sequence":"additional","affiliation":[{"name":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4917-8127","authenticated-orcid":false,"given":"Esti","family":"Rahmawati Agustina","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok City, Jawa Barat, Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105404"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.018468"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102502"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/21CW48944.2021.9532579"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.31577\/cai_2022_6_1401"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.023460"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102453"},{"key":"ref8","volume-title":"2023 Data Breach Report","year":"2024"},{"key":"ref9","volume-title":"Cost of a Data Breach Report 2024","year":"2024"},{"key":"ref10","volume-title":"DBIR: Data Breach Investigations Report 2023","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2020.00036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.47191\/ijcsrr\/V7-i6-42"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10048930"},{"key":"ref14","volume-title":"Retrieving ATT&CK Tactics and Techniques in Cyber Threat Reports","author":"Solange","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3442181"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-024-09764-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00318-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/9781003121541-4"},{"key":"ref21","article-title":"From threat reports to continuous threat intelligence: A comparison of attack technique extraction methods from textual artifacts","volume-title":"arXiv:2210.02601","author":"Rahman","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3270619"},{"key":"ref23","volume-title":"Enterprise Tactics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/info15040214"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3594553"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3401200"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC60891.2024.10427746"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICELTICs56128.2022.9932097"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/a15090314"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.340722"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3306593"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103963"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3223881"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.0150125"},{"key":"ref35","volume-title":"Reports Classification by Adversarial Tactics and Techniques","author":"Legoy","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0307112"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123328"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.37394\/23209.2024.21.31"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.29244\/ijsa.v8i1p70-82"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS62114.2024.10541220"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121084"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3179381"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107168"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.engfailanal.2022.106951"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5512"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE50715.2020.9274570"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3225685"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v14i3.pp3303-3312"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE58854.2023.10246084"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICISIM.2017.8122151"},{"key":"ref51","first-page":"1","article-title":"Identifying classification algorithms most suitable for imbalanced data","volume-title":"Proc. 15th Int. Conf. Data Sci.","author":"Tischio"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00139"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/info12080286"},{"issue":"4","key":"ref54","first-page":"42","article-title":"An overview of classification algorithms for imbalanced datasets","volume":"2","author":"Ganganwar","year":"2012","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref55","first-page":"4","article-title":"An experimental comparison of classification algorithm performances for highly imbalanced datasets","volume-title":"Proc. Central Eur. Conf. Inf. Intell. Syst.","author":"Ore\u0161ki"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.13189\/ms.2021.090320"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221106935"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093094"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961784"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2021.1969733"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECT61758.2024.10739275"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93651-5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s41664-018-0068-2"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2021.27.3.189"},{"key":"ref65","article-title":"Blocked cross-validation: A precise and efficient method for hyperparameter tuning","author":"Merola","year":"2023","journal-title":"arXiv:2306.06591"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.22146\/ijccs.58092"},{"key":"ref67","volume-title":"EVTX-to-MITRE-Attack","year":"2024"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10818683.pdf?arnumber=10818683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:49:21Z","timestamp":1740084561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10818683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3524502","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}