{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T04:19:40Z","timestamp":1769055580889,"version":"3.49.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073390","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:08Z","timestamp":1508959148000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Multi-dimensional structural data integration for proactive cyber-defence"],"prefix":"10.1109","author":[{"given":"Ikwu","family":"Ruth","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"295","article-title":"VAST challenge 2014: The Kronos incident","author":"whiting","year":"2015","journal-title":"2014 IEEE Conf Vis Anal Sci Technol VAST 2014 - Proc"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"ref33","first-page":"12","article-title":"State of the Art Review of Network Traffic Classification based on Machine Learning Approach","volume":"icrtet","author":"singhal","year":"2013","journal-title":"IJCA Proc Int Conf Recent Trends Eng Technol 2013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.031913.130066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref30","first-page":"1009","article-title":"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents","author":"liu","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref37","article-title":"Classification of IDS Alerts with Data Mining Techniques","author":"gabra","year":"2014","journal-title":"Proceedings - IEEE Military Communications Conference MILCOM"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5120\/953-1330"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71549-8_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref27","author":"bartlett","year":"2015","journal-title":"The Dark Net"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/TNET.2007.902685","article-title":"Statistical techniques for detecting traffic anomalies through packet header data","volume":"16","author":"kim","year":"2008","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46578-3_53"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859800"},{"key":"ref20","first-page":"217","article-title":"Social Media Analytics for Cyber Attack Forensic","volume":"1","author":"lau","year":"2012","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref22","first-page":"69","article-title":"The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers","volume":"9","author":"cavusoglu","year":"2004","journal-title":"Int J Electron Commun"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.145"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2013.28"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4324\/CSS"},{"key":"ref26","author":"leigh","year":"2011","journal-title":"WikiLeaks"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2013.784468"},{"key":"ref11","author":"harding","year":"2014","journal-title":"The Snowden files"},{"key":"ref40","first-page":"2009","article-title":"Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer","author":"baggili","year":"2015","journal-title":"AAAI Spring Symp"},{"key":"ref12","article-title":"Understanding the DAO Attack","author":"siegel","year":"2016","journal-title":"CoinDesk"},{"key":"ref13","first-page":"1","article-title":"Characterizing Cyberspace: Past, Present, and Future","volume":"2010","author":"clark","year":"2010","journal-title":"ECIR Work Pap"},{"key":"ref14","author":"klimburg","year":"2011","journal-title":"Special Issue Cyberspace and Governance - A primer"},{"key":"ref15","first-page":"62","article-title":"United States Def. Force","volume":"12","year":"2013","journal-title":"United States Defense Force"},{"key":"ref16","article-title":"19th ICCRTS: C2 Agility: Lessons Learned from Research and Operations Paper 081: Using causal models to manage the cyber threat to C2 agility: working with the benefit of hindsight","year":"2014","journal-title":"Command Control Res Technol Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.07.012"},{"key":"ref18","article-title":"Using causal models to manage the cyber threat to C2 agility: working with the benefit of hindsight","author":"barnett","year":"2014","journal-title":"19th ICCRTS C2 Agil"},{"key":"ref19","first-page":"1","article-title":"Cyber Power","author":"nye","year":"2010","journal-title":"Belfer Cent Sci Int Aff"},{"key":"ref4","first-page":"610","article-title":"Security Attack Prediction Based on User Sentiment Analysis of Twitter Data","author":"hern\u00e1ndez","year":"2016","journal-title":"Proc 2016 IEEE Int Conf Ind Tech"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.9"},{"key":"ref8","author":"gandhi","year":"2011","journal-title":"Social Political Economic and Cultural"},{"key":"ref7","author":"olsen","year":"2013","journal-title":"We Are Anonymous"},{"key":"ref49","volume":"v","author":"yan","year":"2013","journal-title":"Early Detection of Cyber Security Threats using Structured Behavior Modeling"},{"key":"ref9","author":"zetter","year":"2014","journal-title":"Countdown to Zero Day"},{"key":"ref46","first-page":"383","article-title":"Vector Autoregressive Models for Multivariate Time Series","author":"zivot","year":"2006","journal-title":"Model Financ Time Ser with S-PLUS&#x00AE;"},{"key":"ref45","first-page":"496","article-title":"Chapter 2 - Stationary Time-Series Models","author":"enders","year":"2014","journal-title":"Applied Econometric Time Series"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.07.012"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_609"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2014.66"},{"key":"ref41","first-page":"129","author":"pandey","year":"2014","journal-title":"Using Prediction Markets to Hedge Information"},{"key":"ref44","volume":"46","author":"enders","year":"1995","journal-title":"Applied Econometric Time Series Ch 2 pdf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/1912791"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"London, United Kingdom","start":{"date-parts":[[2017,6,19]]},"end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073390.pdf?arnumber=8073390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T04:35:25Z","timestamp":1570250125000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073390","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}