{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:06:42Z","timestamp":1771520802610,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427746","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:29Z","timestamp":1707867329000},"page":"0541-0547","source":"Crossref","is-referenced-by-count":10,"title":["Using Natural Language Processing Tools to Infer Adversary Techniques and Tactics Under the Mitre ATT&amp;CK Framework"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Gabrys","sequence":"first","affiliation":[{"name":"Naval Information Warfare Center Pacific"}]},{"given":"Mark","family":"Bilinski","sequence":"additional","affiliation":[{"name":"Naval Information Warfare Center Pacific"}]},{"given":"Sunny","family":"Fugate","sequence":"additional","affiliation":[{"name":"Naval Information Warfare Center Pacific"}]},{"given":"Daniel","family":"Silva","sequence":"additional","affiliation":[{"name":"Naval Information Warfare Center Pacific"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591067"},{"key":"ref2","author":"Usman Hadi","year":"2023","journal-title":"A survey on large language models: Applications, challenges, limitations, and practical usage"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s23020651"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2145642"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA53316.2021.9564227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1040031"},{"key":"ref8","first-page":"1","article-title":"CAN-BERT do it? Controller Area Network IDS based on BERT Language Model","author":"Alkhatib","year":"2022","journal-title":"AICCSA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMC52423.2021.9659287"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3363469"},{"key":"ref11","volume-title":"MITRE ATT&CK","year":"2023"},{"key":"ref13","volume-title":"Automated Suricata-to-ATT&CK Mapper using Machine Learning","author":"Hermawan","year":"2023"},{"key":"ref14","volume-title":"SBERT Sentence Transformers","year":"2023"},{"key":"ref15","article-title":"Principal component analysis vs. exploratory factor analysis","volume-title":"SUGI 30 Proc","author":"Suhr"},{"key":"ref16","volume-title":"XGBoost","year":"2023"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2024,1,8]]},"end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427746.pdf?arnumber=10427746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:09:45Z","timestamp":1727500185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427746","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}