{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:52:46Z","timestamp":1730213566301,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899391","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T23:18:43Z","timestamp":1574723923000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Pattern discovery in intrusion chains and adversarial movement"],"prefix":"10.1109","author":[{"given":"Nima","family":"Asadi","sequence":"first","affiliation":[]},{"given":"Aunshul","family":"Rege","sequence":"additional","affiliation":[]},{"given":"Zoran","family":"Obradovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cptc (collegiate penetration testing competition)","year":"0","key":"ref4"},{"journal-title":"Standardizing cyber threat intelligence information with the Structured Threat Information eXpression","year":"0","author":"barnum","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307451"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/b107408"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985864"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(83)90042-1"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-540-28608-0_8","article-title":"Clustering data streams","author":"guha","year":"2016","journal-title":"Data Stream Management"},{"journal-title":"Advanced Persistent Threats Understand the Threat","year":"0","key":"ref2"},{"key":"ref9","volume":"3","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"journal-title":"Lifecycle of an Advanced Persistent Threat","year":"0","key":"ref1"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899391.pdf?arnumber=8899391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:34Z","timestamp":1658094934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899391","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}