{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:32:36Z","timestamp":1771705956709,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995959","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"01-06","source":"Crossref","is-referenced-by-count":3,"title":["Cyber-attack Group Representation based on Adversary Artifacts with Machine Learning"],"prefix":"10.1109","author":[{"given":"Ahmad Asyraf","family":"Mustafar","sequence":"first","affiliation":[{"name":"Center for Cyber Security (Cyber) Universiti Kebangsaan Malaysia,Bangi,Malaysia"}]},{"given":"Noor Faridatul","family":"Ainun Zainal","sequence":"additional","affiliation":[{"name":"Center for Cyber Security (Cyber) Universiti Kebangsaan Malaysia,Bangi,Malaysia"}]},{"given":"Tajul Azhar","family":"Mohd Tajul Ariffin","sequence":"additional","affiliation":[{"name":"Center for Cyber Security (Cyber) Universiti Kebangsaan Malaysia,Bangi,Malaysia"}]},{"given":"Siti Norul","family":"Huda Sheikh Abdullah","sequence":"additional","affiliation":[{"name":"Center for Cyber Security (Cyber) Universiti Kebangsaan Malaysia,Bangi,Malaysia"}]},{"given":"Kauthar Mohd","family":"Daud","sequence":"additional","affiliation":[{"name":"Center for Cyber Security (Cyber) Universiti Kebangsaan Malaysia,Bangi,Malaysia"}]},{"given":"Yau Ti","family":"Dun","sequence":"additional","affiliation":[{"name":"Chief Executive Officer (CEO) SysArmy Sdn. Bhd.,Kuala Lumpur,Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2019-0802-01"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102237"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icbats54253.2022.9758933"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0589-4_31"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2018.00132"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.12.016"},{"issue":"2","key":"ref7","first-page":"136","article-title":"Ransomware, Threat and Detection Techniques: A Review","volume":"19","author":"Kok","year":"2019","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref8","volume-title":"Cybersecurity Challenges that Small and Medium Enterprises Faced and Its Way Forward","author":"Malaysia","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.09.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.022"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2022,10,6]]},"end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995959.pdf?arnumber=9995959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:22:35Z","timestamp":1709378555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995959","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}