{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:46:37Z","timestamp":1760550397675,"version":"3.41.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073398","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:08Z","timestamp":1508959148000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies"],"prefix":"10.1109","author":[{"given":"Aunshul","family":"Rege","sequence":"first","affiliation":[]},{"given":"Zoran","family":"Obradovic","sequence":"additional","affiliation":[]},{"given":"Nima","family":"Asadi","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Singer","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Masceri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","year":"0","author":"hutchins","key":"ref10"},{"journal-title":"Ponemon Institute 2016 Cost of Data Breach Study Global Analysis","year":"0","key":"ref11"},{"journal-title":"The Five Core Components of Proactive Cybersecurity","year":"0","author":"kulkarni","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/b107408"},{"key":"ref14","first-page":"698","article-title":"Peak-valley segmentation algorithm for fatigue time series data","volume":"12","author":"nopiah","year":"2008","journal-title":"WSEAS Trans Math"},{"key":"ref15","article-title":"Survey of Peaks\/Valleys identification in Time Series","author":"schneider","year":"2011","journal-title":"Department of Informatics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-011-9146-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1562164.1562198"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.5040\/9798400694684","author":"clarke","year":"2006","journal-title":"Outsmarting the Terrorists"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/2193-7680-2-6"},{"key":"ref6","first-page":"151","article-title":"The procedural analysis of offending and its relevance for situational prevention","volume":"3","author":"cornish","year":"1994","journal-title":"Crime prevention studies"},{"journal-title":"Security Intelligence Attacking the Cyber Kill Chain","year":"0","author":"cloppert","key":"ref5"},{"key":"ref8","first-page":"172","article-title":"Organised crime and crime scripts: prospects for disruption","author":"hancock","year":"2010","journal-title":"Situational prevention of organised crimes"},{"key":"ref7","first-page":"1","article-title":"Introduction: Criminology, Routine Activity, and Rational Choice","volume":"5","author":"cornish","year":"2008","journal-title":"Advances in Criminological Theory"},{"journal-title":"Standardizing cyber threat intelligence information with the Structured Threat Information eXpression","year":"0","author":"barnum","key":"ref2"},{"journal-title":"DELL 2012 Lifecycle of an Advanced Persistent Threat","year":"0","key":"ref1"},{"key":"ref9","first-page":"120","article-title":"Potential uses of computer agent-based simulation modelling in the evaluation of wildlife poaching","author":"hill","year":"2014","journal-title":"Situational Prevention of Poaching"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2017,6,19]]},"location":"London, United Kingdom","end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073398.pdf?arnumber=8073398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T18:52:48Z","timestamp":1750963968000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073398","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}