{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:10:42Z","timestamp":1760080242770,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647326","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:34:06Z","timestamp":1550792046000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation"],"prefix":"10.1109","author":[{"given":"Adel","family":"Alshamrani","sequence":"first","affiliation":[]},{"given":"Ankur","family":"Chowdhary","sequence":"additional","affiliation":[]},{"given":"Oussama","family":"Mjihil","sequence":"additional","affiliation":[]},{"given":"Sowmya","family":"Myneni","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","author":"brogi","year":"2016","journal-title":"Terminaptor Highlighting advanced persistent threats through information flow tracking In New Technologies Mobility and Security (NTMS) 2016 8th IFIP International Conference"},{"key":"ref11","first-page":"9","author":"suh-lee","year":"2015","journal-title":"Quantifying security risk by measuring network risk conditions In Computer and Information Science (ICIS) 2015 IEEE\/ACIS 14th International Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.32"},{"key":"ref13","first-page":"465","volume":"23","author":"fall","year":"2015","journal-title":"Security risk quantification mechanism for infrastructure as a service cloud computing platforms Journal of Information Processing"},{"key":"ref14","first-page":"317","author":"zhang","year":"2014","journal-title":"After we knew it empirical study and modeling of cost -effectiveness of exploiting prevalent known vulnerabilities across iaas cloud In Proceedings of the 9th ACM symposium on Information computer and communications security"},{"journal-title":"Mulval A logic-based network security analyzer In USENIX security","year":"2005","author":"ou","key":"ref15"},{"year":"2017","key":"ref16"},{"key":"ref17","first-page":"430","author":"rao","year":"1997","journal-title":"Xsb A system for efficiently computing well-founded semantics In International Conference on Logic Programming and Nonmonotonic Reasoning"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7788"},{"key":"ref4","first-page":"91","volume":"44","author":"chen","year":"2011","journal-title":"Lessons from Stuxnet Computer"},{"key":"ref3","first-page":"509","author":"ussath","year":"2016","journal-title":"Event attribute tainting A new approach for attack tracing and event correlation In Network Operations and Management Symposium (NOMS) 2016 IEEE\/IFIP"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"bencs\u00e1th","year":"2012","journal-title":"The cousins of stuxnet Duqu flame and gauss Future Internet"},{"key":"ref5","volume":"2012","author":"bencs\u00e1th","year":"2012","journal-title":"Duqu Analysis detection and lessons learned In ACM European Workshop on System Security (EuroSec)"},{"key":"ref8","first-page":"1","author":"singh","year":"2016","journal-title":"A comprehensive study on apt attacks and countermeasures for future networks and communications challenges and solutions The Journal of Supercomputing"},{"key":"ref7","first-page":"127","volume":"109","author":"marchetti","year":"2016","journal-title":"Analysis of high volumes of network traffic for advanced persistent threat detection Computer Networks"},{"journal-title":"A kill chain analysis of the 2013 target data breach Technical report tech rep Committee on Commerce Science and Transportation","year":"2014","author":"rockefeller","key":"ref2"},{"key":"ref1","first-page":"16","volume":"8","author":"tankard","year":"2011","journal-title":"Advanced persistent threats and how to monitor and deter them Network Security 2011"},{"key":"ref9","first-page":"245","author":"ning","year":"2002","journal-title":"Constructing attack scenarios through correlation of intrusion alerts In Proceedings of the 9th ACM Conference on Computer and Communications Security"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647326.pdf?arnumber=8647326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:28:08Z","timestamp":1643268488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647326","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}