{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T18:10:03Z","timestamp":1748715003183,"version":"3.41.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346839","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"290-298","source":"Crossref","is-referenced-by-count":5,"title":["Using linkography to understand cyberattacks"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Fisher","sequence":"first","affiliation":[]},{"given":"Carson","family":"Kent","sequence":"additional","affiliation":[]},{"given":"David","family":"Zage","sequence":"additional","affiliation":[]},{"given":"John","family":"Jarocki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2005.02.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5131-9_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2008.03.001"},{"key":"ref13","first-page":"291","article-title":"Linkography: assessing design productivity","volume":"1","author":"goldschmidt","year":"1990","journal-title":"Cyber-betics and System"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0142-694X(94)00009-3"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.52842\/conf.caadria.2005.451","article-title":"Can entropy represent design richness in team designing?","author":"kan","year":"2005","journal-title":"Proc of CCAADRIA"},{"key":"ref16","article-title":"A generic tool to study human design activities","author":"kan","year":"2009","journal-title":"ICE Proceedings"},{"key":"ref17","article-title":"LINKOgrapher: An analysis tool to study design protocols based on FBS coding scheme","author":"pourmohamadi","year":"2011","journal-title":"ICE Proceedings"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref19","article-title":"Developing an ontology of the cyber security domain","author":"obrst","year":"2012","journal-title":"Proc of STIDS"},{"key":"ref4","article-title":"Who enjoys shopping in IKEA?","author":"penn","year":"2011","journal-title":"UCL Lunch Hour Lecture"},{"journal-title":"Active combat in the era of continuous compromise","year":"2013","author":"zaichkowsky","key":"ref3"},{"key":"ref6","article-title":"An evening with berferd in which a cracker is lured, endured, and studied","author":"cheswick","year":"1992","journal-title":"Proc of USENIX"},{"key":"ref5","article-title":"Order, structure and disorder in space syntax and linkography: Intelligibility, entropy, and complexity measures","author":"el-khouly","year":"2012","journal-title":"Proc SSST"},{"key":"ref8","article-title":"Categorizing threat: Building and using a generic threat matrix","author":"duggan","year":"2007","journal-title":"Sandia National Laboratories Tech Rep"},{"journal-title":"The Cuckoo's Egg Tracking a Spy Through the Maze of Computer Espionage","year":"2005","author":"stoll","key":"ref7"},{"journal-title":"Technical Report Georgia Tech Research Institute","article-title":"Emerging cyber threats report 2015","year":"2014","key":"ref2"},{"journal-title":"Cisco Tech Rep","article-title":"Visual networking index: Forecast and methodology, 2013-2018","year":"2014","key":"ref9"},{"journal-title":"Symantec Tech Rep","article-title":"2014 internet security threat report","year":"2014","key":"ref1"},{"journal-title":"GrrCON forensics challenge","year":"2012","author":"crook","key":"ref20"},{"article-title":"Honeypots: tracking hackers","year":"2002","author":"spitzner","key":"ref22"},{"journal-title":"Chopshop protocol analysis\/decoder framework MITRE","year":"2013","author":"shields","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-05118-0_51","article-title":"Self adaptive high interaction honeypots driven by game theory","author":"wagener","year":"2009","journal-title":"Stabilization Safety and Security of Distributed Systems"},{"key":"ref23","article-title":"A virtual honeypot framework","author":"provos","year":"2004","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067867"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346839.pdf?arnumber=7346839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T17:57:46Z","timestamp":1748714266000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346839","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}