{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:44:31Z","timestamp":1749876271441,"version":"3.33.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/cic62241.2024.00012","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:37:09Z","timestamp":1736969829000},"page":"9-18","source":"Crossref","is-referenced-by-count":1,"title":["Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs"],"prefix":"10.1109","author":[{"given":"Charalampos","family":"Katsis","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Xin","family":"Jin","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Fan","family":"Sang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Jiahao","family":"Sun","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Ramana Rao","family":"Kompella","sequence":"additional","affiliation":[{"name":"Cisco Research"}]},{"given":"Ashish","family":"Kundu","sequence":"additional","affiliation":[{"name":"Cisco Research"}]}],"member":"263","reference":[{"article-title":"Edge security: Challenges and issues","year":"2022","author":"Jin","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176339"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297401"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI54339.2022.00017"},{"key":"ref6","article-title":"Structuring a vulnerability description for comprehensive single system security analysis","author":"Urbanska","year":"2012","journal-title":"Rocky Mountain Celebration of Women in Computing, Fort Collins, CO, USA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6_30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.12.899-907"},{"volume-title":"National vulnerability database","year":"2024","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53817-4_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2019.00038"},{"article-title":"Compromising the macOS kernel through Safari by chaining six vulnerabilities","volume-title":"Black Hat USA Briefings (Black Hat USA)","author":"Jin","key":"ref14"},{"article-title":"Understanding and securing device vulnerabilities through automated bug report analysis","volume-title":"SEC\u201919: Proceedings of the 28th USENIX Conference on Security Symposium","author":"Feng","key":"ref15"},{"article-title":"Automatic labeling for entity extraction in cyber security","year":"2013","author":"Bridges","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"ref18","first-page":"356","article-title":"Automated extraction of vulnerability information for home computer security","volume-title":"International Symposium on Foundations and Practice of Security","author":"Weerawardhana"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467159"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560640"},{"key":"ref21","first-page":"673","article-title":"Dynamic programming algorithms for transition-based dependency parsers","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Kuhlmann"},{"volume-title":"Key details phrasing","year":"2022","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref25","article-title":"Mitre att&ck: Design and philosophy","volume-title":"Technical report","author":"Strom","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"article-title":"Efficient estimation of word representations in vector space","year":"2013","author":"Mikolov","key":"ref27"},{"volume-title":"Common vulnerability scoring system v3.1: Specification document","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-0208(08)73101-3"},{"article-title":"spacy: Industrial-strength natural language processing in python","year":"2020","author":"Honnibal","key":"ref30"},{"issue":"2","key":"ref31","article-title":"Gensim\u2013python framework for vector space modelling","volume":"3","author":"Rehurek","year":"2011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.25080\/TCWV9851"},{"issue":"36","key":"ref36","article-title":"Graph database applications and concepts with neo4j","volume-title":"Proceedings of the southern association for information systems conference","volume":"2324","author":"Miller"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3498537"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.10.101"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-2012"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2019.12"},{"issue":"11","key":"ref42","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"Journal of machine learning research"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2172\/573291"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329853"},{"key":"ref46","first-page":"356","article-title":"Automated extraction of vulnerability information for home computer security","volume-title":"Foundations and Practice of Security: 7th International Symposium, FPS 2014","author":"Weerawardhana"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2019.00039"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.23104.28169"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref52","first-page":"905","article-title":"{ATTACK2VEC}: Leveraging temporal word embeddings to understand the evolution of cyberattacks","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Shen"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.027"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.1630921"}],"event":{"name":"2024 IEEE 10th International Conference on Collaboration and Internet Computing (CIC)","start":{"date-parts":[[2024,10,28]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 IEEE 10th International Conference on Collaboration and Internet Computing (CIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10835742\/10835769\/10835794.pdf?arnumber=10835794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T05:52:24Z","timestamp":1737006744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10835794\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/cic62241.2024.00012","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}