{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:31Z","timestamp":1756273231347,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130139","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"194-199","source":"Crossref","is-referenced-by-count":0,"title":["Large Scale Cyber Security Log Classification Using Semi-Supervised Clustering"],"prefix":"10.1109","author":[{"given":"Peng","family":"Cai","sequence":"first","affiliation":[{"name":"Curtin University,School of EECMS,Perth,Western Australia"}]},{"given":"Mihai","family":"Lazarescu","sequence":"additional","affiliation":[{"name":"Curtin University,School of EECMS,Perth,Western Australia"}]},{"given":"Sie Teng","family":"Soh","sequence":"additional","affiliation":[{"name":"Curtin University,School of EECMS,Perth,Western Australia"}]},{"given":"Reza","family":"Ryan","sequence":"additional","affiliation":[{"name":"Curtin University,School of EECMS,Perth,Western Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956786"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991517"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4961-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCTT51595.2020.00083"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icisa.2011.5772437"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/9781786345646_001"},{"article-title":"Comprehensive, multi-source cybersecurity events data set","year":"2015","author":"Kent","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"volume-title":"Common Crawl Dataset","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.1997.632303"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"ref19","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","volume":"78","author":"Ptacek","year":"1998"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"issue":"1","key":"ref21","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"Roesch","year":"1999","journal-title":"Lisa"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844148"},{"article-title":"Improving Host Security with System Call Policies","volume-title":"USENIX Security Symposium","author":"Provos","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330840"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.077"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.10.012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32047-8_16"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAE.2010.5452085"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478433"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130139.pdf?arnumber=11130139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:14:41Z","timestamp":1756271681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130139","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}