{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:35Z","timestamp":1766298275795,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850317","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"50-55","source":"Crossref","is-referenced-by-count":3,"title":["Host-based Cyber Attack Pattern Identification on Honeypot Logs Using Association Rule Learning"],"prefix":"10.1109","author":[{"given":"Angelos","family":"Papoutsis","sequence":"first","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]},{"given":"Christos","family":"Iliou","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]},{"given":"Dimitris","family":"Kavallieros","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,CERTH,Thessaloniki,Greece"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-02007-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"ref12","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf on Very large Data Bases"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378947"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1923"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0112-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IACC48062.2019.8971584"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2050685"},{"key":"ref18","first-page":"164","article-title":"Association rule pattern mining approaches network anomaly detection","author":"aung","year":"2015","journal-title":"Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT&#x2019;2015)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.2018.25905182"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref3","first-page":"202","article-title":"Network intrusion detection using association rules","volume":"2","author":"tsai","year":"2009","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071263"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75197-7"},{"key":"ref7","first-page":"627","article-title":"A survey on supervised and unsupervised learning techniques","author":"sindhu meena","year":"2019","journal-title":"International Conference on Artificial Intelligence Smart Grid and Smart City Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108708"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21542-6_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"journal-title":"A probabilistic comparison of commonly used interest measures for association rules","year":"2015","author":"hahsler","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00473-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253325"},{"key":"ref23","first-page":"6","article-title":"An analytical study of various frequent itemset mining algorithms","volume":"1","author":"patel tushar","year":"2013","journal-title":"Res J Computer & IT Sci"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2022,7,27]]},"location":"Rhodes, Greece","end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850317.pdf?arnumber=9850317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:23:14Z","timestamp":1662409394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850317","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}