{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:36:31Z","timestamp":1764174991074,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9378213","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T21:10:21Z","timestamp":1616188221000},"page":"1823-1830","source":"Crossref","is-referenced-by-count":9,"title":["Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making"],"prefix":"10.1109","author":[{"given":"Antonio Jose","family":"Horta Neto","sequence":"first","affiliation":[]},{"given":"Anderson","family":"Fernandes Pereira dos Santos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09510-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45541-5_10"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9142880"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009733"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031182"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref11","first-page":"1","article-title":"The unified kill chain","author":"pols","year":"2017","journal-title":"CSA Thesis Hague"},{"article-title":"Operation endtrade: Tick&#x2019;s multi-stage backdoors for attacking industries and stealing classified data","year":"2019","author":"joey chen","key":"ref12"},{"year":"2020","key":"ref13","article-title":"Stix version 2.1"},{"journal-title":"Knowledge Discovery in Databases","year":"1991","author":"piateski","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/69.250073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/b107408"},{"article-title":"Github - neo23x0\/sigma: Generic signature for-mat for siem systems","year":"2017","author":"patzke","key":"ref17"},{"key":"ref18","article-title":"igen: Toward automatic generation and analysis of indica-tors of compromise (iocs) using convolutional neural network","author":"panwar","year":"2017","journal-title":"Univ Arizona Arizona State"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.013"},{"key":"ref28","first-page":"119","article-title":"Social utilities","volume":"6","author":"edwards","year":"1971","journal-title":"Engineering Economist"},{"journal-title":"The Threat Intelligence Handbook Second Edition","year":"2019","author":"pokorny","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSCI.2008.017590"},{"key":"ref3","first-page":"37","article-title":"From data mining to knowledge discovery in databases","volume":"17","author":"fayyad","year":"1996","journal-title":"AI Magazine"},{"article-title":"A practical model for conducting cyber threat hunting","year":"2018","author":"gunter","key":"ref6"},{"article-title":"Topsis (technique for order preference by similarity to ideal solution)&#x2013;a multiple attribute decision making, w: Multiple attribute decision making&#x2013;methods and applications, a state-of-the-at survey","year":"1981","author":"yoon","key":"ref29"},{"key":"ref5","first-page":"7","article-title":"A laboratory for hands-on cyber threat hunting education","volume":"7","author":"wei","year":"2020","journal-title":"Journal for the Colloquium for Information Systems Security Education"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"year":"2020","key":"ref7","article-title":"Mitre att&ck&#x00AE;"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"article-title":"Cyber kill chain&#x00AE; &#x2014; lockheed martin","year":"0","author":"martin","key":"ref9"},{"journal-title":"2020 Data Breach Investigations Report","year":"2020","key":"ref1"},{"article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","year":"2017","author":"tuor","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2019.1582861"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0307-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2.2.172"},{"key":"ref23","first-page":"74","article-title":"Semantic cyberthreat modelling","author":"bromander","year":"2016","journal-title":"STIDS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10100-019-00641-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-3094-4"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09378213.pdf?arnumber=9378213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:51:10Z","timestamp":1656345070000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9378213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9378213","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}