{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T11:29:12Z","timestamp":1760441352287},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529438","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T16:28:26Z","timestamp":1470328106000},"source":"Crossref","is-referenced-by-count":25,"title":["Countering Advanced Persistent Threats through security intelligence and big data analytics"],"prefix":"10.1109","author":[{"given":"Mirco","family":"Marchetti","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Pierazzi","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Guido","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.32"},{"key":"ref32","author":"soong","year":"2004","journal-title":"Fundamentals of Probability and Statistics for Engineers"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.44"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"ref10","article-title":"Retrieved from World most popular data breaches","year":"2016","journal-title":"Information Is Beautiful"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref13","first-page":"280","article-title":"Multicast inference of packet delay variance at interior network links","author":"duffield","year":"2009","journal-title":"IEEE Computer and Communications Societies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.09.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.16"},{"key":"ref16","first-page":"139","article-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref17","first-page":"1","article-title":"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation","author":"gu","year":"2007","journal-title":"Usenix Security"},{"key":"ref18","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","author":"hutchins","year":"2011","journal-title":"Proceedings of the 6th International Ionference on i- Warfare and Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.003"},{"key":"ref4","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"ref6","author":"brockwell","year":"2013","journal-title":"Time Series Theory and Methods"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70040-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2011.05.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BASNA.2010.5730307"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.53"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462433"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35264-5_21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89598-5_11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158074"},{"key":"ref23","article-title":"Information leakage through online social networking: Opening the doorway for advanced persistent threats","author":"molok","year":"2010","journal-title":"School of Computer and Information Science"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/9781118309629"},{"key":"ref25","author":"montgomery","year":"1991","journal-title":"Introduction to Statistical Quality Control"}],"event":{"name":"2016 8th International Conference on Cyber-Conflict (CyCon)","location":"Tallinn","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529438.pdf?arnumber=7529438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T20:31:57Z","timestamp":1555619517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7529438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529438","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}