{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T09:00:42Z","timestamp":1767085242922,"version":"3.44.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108976","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:03:11Z","timestamp":1591376591000},"page":"66-72","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations"],"prefix":"10.1109","author":[{"given":"Abdelmalek","family":"Benzekri","sequence":"first","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse Universit&#x00E9; de Toulouse 3 Paul Sabatier,Toulouse,France"}]},{"given":"Romain","family":"Laborde","sequence":"additional","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse Universit&#x00E9; de Toulouse 3 Paul Sabatier,Toulouse,France"}]},{"given":"Arnaud","family":"Oglaza","sequence":"additional","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse Universit&#x00E9; de Toulouse 3 Paul Sabatier,Toulouse,France"}]},{"given":"Darine","family":"Rammal","sequence":"additional","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse Universit&#x00E9; de Toulouse 3 Paul Sabatier,Toulouse,France"}]},{"given":"Fran\u00e7ois","family":"Barr\u00e8re","sequence":"additional","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse Universit&#x00E9; de Toulouse 3 Paul Sabatier,Toulouse,France"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Credentials to an airport's security systems sold on the dark web for $10","author":"jeffrey","year":"2018","journal-title":"techspot com"},{"journal-title":"Top 10 Countries Where Cyber Attacks Originate","year":"2013","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-0673-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814050"},{"key":"ref14","article-title":"Managing Break-The-Glass using Situation-oriented authorizations","author":"kabbani","year":"2014","journal-title":"9eme Conference sur la Securite des Architectures Reseaux et Systemes d&#x2019;Information-SAR-SSI 2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0108-y"},{"key":"ref16","first-page":"3","article-title":"The power of events: An introduction to complex event processing in distributed enterprise systems","author":"luckham","year":"2008","journal-title":"Rules and Rule Markup Languages for the Semantic Web"},{"journal-title":"Tech Rep","article-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","year":"2013","key":"ref17"},{"key":"ref18","article-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations","author":"hu","year":"2016","journal-title":"NIST Tech Rep SP 800-162"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"CybOX Cyber Observable Expression","year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"journal-title":"OASIS TAXII&#x2122; Trusted Automated Exchange of Intelligence Information Version 2 0 Working Draft 02 OASIS","year":"2017","key":"ref8"},{"journal-title":"OASIS STIX&#x2122; Structured Threat Information eXpression version 2 0 Part 1 STIX Core Concepts OASIS standard","year":"2017","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_9"},{"journal-title":"Cybercrime","year":"2015","key":"ref1"},{"journal-title":"Mitre CAPEC&#x2122; Common Attack Pattern Enumeration and Classification","year":"0","key":"ref9"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2019,10,23]]},"location":"Quito, Ecuador","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108976.pdf?arnumber=9108976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:28:39Z","timestamp":1756754919000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108976","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}