{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:18:57Z","timestamp":1740201537126,"version":"3.37.3"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885698","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1317-1322","source":"Crossref","is-referenced-by-count":0,"title":["A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats"],"prefix":"10.1109","author":[{"given":"Rajesh","family":"Kumar","sequence":"first","affiliation":[{"name":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India"}]},{"given":"Swapnil","family":"Pandey","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.052447"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61717-6_4"},{"issue":"53","key":"ref3","first-page":"8","article-title":"Security and privacy controls for federal information systems and organizations","volume":"800","author":"Force","year":"2013","journal-title":"NIST Special Publication"},{"volume-title":"ISO\/IEC. Iso\/iec 27005:2022 information security, cybersecurity and privacy protection \u2014 guidance on managing information security risks","year":"2022","key":"ref4"},{"volume-title":"Technical standard to risk taxonomy, c081","year":"2009","key":"ref5"},{"volume-title":"OctaveSM threat profiles","year":"2001","author":"Alberts","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICED.2016.7804660"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21236\/ada609863"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93511-5_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100521"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00295"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110376"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70881-8_3"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.3990\/1.9789036546256","article-title":"Truth or dare: quantitative security risk analysis via attack trees","volume-title":"PhD thesis","author":"Kumar","year":"2018"},{"volume-title":"Risk management \u2013 guidelines","year":"2018","key":"ref20"},{"issue":"1","key":"ref21","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"volume-title":"Mitre att&ck\u00ae for industrial control systems: Design and philosophy","year":"2020","author":"Alexander","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24249-1_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.043"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.045"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443793"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991126"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2181132"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925838"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994496"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2458581"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511197"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875484"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.09.006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168675"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_18"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101660"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_16"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844878"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659418"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885251"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885698.pdf?arnumber=10885698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:11:04Z","timestamp":1740121864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885698","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}