{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:00:51Z","timestamp":1755799251294,"version":"3.44.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899657","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["The Future of Cyber Analytics: Identity Classification for Systematic and Predictive Insight"],"prefix":"10.1109","author":[{"given":"Mary C. Kay","family":"Michel","sequence":"first","affiliation":[{"name":"Florida Institute of Technology,Computer Engineering and Sciences,Melbourne,FL,USA"}]},{"given":"Michael C.","family":"King","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology,Computer Engineering and Sciences,Melbourne,FL,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/986048"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1803440115"},{"journal-title":"Oxford Dictionaries","year":"2019","key":"ref12"},{"journal-title":"Dictionary com","year":"2019","key":"ref13"},{"journal-title":"Biology Discussion","article-title":"Systematics: Meaning, Branches and Its Application","year":"2016","key":"ref14"},{"journal-title":"Akamai threat advisory Mirai botnet","year":"2016","author":"seaman","key":"ref15"},{"journal-title":"Cybernetics Or Control and Communication in the Animal and the Machine","year":"1948","author":"wiener","key":"ref4"},{"journal-title":"DNA The Story of the Genetic Revolution","year":"2017","author":"watson","key":"ref3"},{"key":"ref6","article-title":"Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime","author":"michel","year":"2018","journal-title":"Proceedings of the 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications (Trustcom-18)"},{"journal-title":"The Mathematical Theory of Communication","year":"1949","author":"shannon","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699064"},{"journal-title":"Internet of Things at-a-glance","article-title":"Cisco","year":"2016","key":"ref7"},{"journal-title":"Evolution","year":"2000","author":"strickberger","key":"ref2"},{"journal-title":"Internet Crime Center Report (IC3) 2016 Annual Report","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094702"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, UK","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899657.pdf?arnumber=8899657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:09:26Z","timestamp":1755626966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899657","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}