{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:06:54Z","timestamp":1748664414501,"version":"3.41.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/apsitt.2015.7217111","type":"proceedings-article","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T21:45:54Z","timestamp":1441057554000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Designing a fast log-tracing scheme for targeted attack prevention"],"prefix":"10.1109","author":[{"given":"Takuya","family":"Suzuki","sequence":"first","affiliation":[]},{"given":"Koki","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Pichaya","family":"Kietkaroon","sequence":"additional","affiliation":[]},{"given":"Junichi","family":"Murayama","sequence":"additional","affiliation":[]},{"given":"Takahiro","family":"Hamada","sequence":"additional","affiliation":[]},{"given":"Yuichi","family":"Murata","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"A Detection Technique of a Targeted Attack Using a Decoy","author":"kitazawa","year":"2013","journal-title":"Technical Report 2013-DPS-154"},{"key":"ref3","article-title":"Information Leakage Monitoring By Log Analysis","author":"sakakibara","year":"2011","journal-title":"Technical Report 2011-CSEC-52"},{"article-title":"Packet Black Hole","year":"0","author":"agent","key":"ref6"},{"key":"ref5","article-title":"An Evaluation Method for a Targeted Attack Protection Scheme Comparing Multiple-Logs","author":"ishii","year":"2014","journal-title":"IEICE General Conference B-7-69"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.53829\/ntr201407fa2","article-title":"The TRX Traceability Platform","volume":"12","author":"motoda","year":"2014","journal-title":"NTT Technical Review"},{"key":"ref2","article-title":"Timeline-Based Event Log Viewer over Multi-Host Environment","author":"tomine","year":"2014","journal-title":"Technical Report ICSS2013-79"},{"key":"ref1","article-title":"Consideration about Targeted Cyber Attack And Advanced Persistent Threat","author":"futagi","year":"2012","journal-title":"Technical Reports 2012-CSEC-56"}],"event":{"name":"2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)","start":{"date-parts":[[2015,8,4]]},"location":"Colombo, Sri Lanka","end":{"date-parts":[[2015,8,7]]}},"container-title":["2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210373\/7217073\/07217111.pdf?arnumber=7217111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T09:46:18Z","timestamp":1748598378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7217111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/apsitt.2015.7217111","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}