{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:19:38Z","timestamp":1734067178957,"version":"3.30.2"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,19]]},"DOI":"10.1109\/cvmi61877.2024.10782249","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:24:11Z","timestamp":1733955851000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Cybersecurity Resilience with CYBRANA: A Cyber YARA\/YAML-Based Resilience Firewall Solution Applied with Next-Gen AI"],"prefix":"10.1109","author":[{"given":"Aaditya","family":"Rengarajan","sequence":"first","affiliation":[{"name":"PSG College of Technology,Computer Science and Engineering,Coimbatore,India"}]},{"given":"G. R.","family":"Karpagam","sequence":"additional","affiliation":[{"name":"PSG College of Technology,Computer Science and Engineering,Coimbatore,India"}]}],"member":"263","reference":[{"article-title":"Limiting Attack Surface for Infrastructure Applications using Custom YAML Templates in Nuclei Automation","year":"2023","author":"Solanki","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102938"},{"article-title":"Limiting Attack Surface for Infrastructure Applications using Custom YAML Templates in Nuclei Automation","year":"2023","author":"Solanki","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359572"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176340"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i8.301304"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s21206715"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT52173.2021.9435453"},{"article-title":"Identification and assessment of security attacks and vulnerabilities, utilizing CVE, CWE and CAPEC","year":"2019","author":"\u0393\u03c1\u03b7\u03b3\u03bf\u03c1\u03b9\u03b1\u03b4\u03b7\u03c2","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA53316.2021.9564227"},{"key":"ref14","article-title":"Automated Generation of Code-based YARA Rules","volume":"5","author":"Bilstein","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.16"},{"article-title":"A Description Logic System for Learning in Complex Domains","volume-title":"Proceedings of the 1998 International Workshop on Description Logics (DL\u201998)","author":"Alvarez","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0388-0001(91)90004-k"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.80"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.129"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91455-8_12"},{"volume-title":"An Open-Source and Portable MLOps Pipeline for Continuous Training and Continuous Deployment","year":"2023","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.37256\/rrcs.2320232644"},{"volume-title":"Framework Model for Identifying, Detecting and Reporting for Cyber Security on Bhuvan Portal","key":"ref23"}],"event":{"name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","start":{"date-parts":[[2024,10,19]]},"location":"Prayagraj, India","end":{"date-parts":[[2024,10,20]]}},"container-title":["2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10781474\/10781502\/10782249.pdf?arnumber=10782249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:36:59Z","timestamp":1733989019000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10782249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,19]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cvmi61877.2024.10782249","relation":{},"subject":[],"published":{"date-parts":[[2024,10,19]]}}}