{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:19:36Z","timestamp":1773263976154,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC05-76RL01830"],"award-info":[{"award-number":["DE-AC05-76RL01830"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["2442595"],"award-info":[{"award-number":["2442595"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/icdmw69685.2025.00140","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:50:39Z","timestamp":1773172239000},"page":"1044-1054","source":"Crossref","is-referenced-by-count":0,"title":["ATT&amp;CK to CVE: A Large-Scale Automated Knowledge Graph for Threat Intelligence"],"prefix":"10.1109","author":[{"given":"Moqsadur","family":"Rahman","sequence":"first","affiliation":[{"name":"The University of Texas at El Paso,USA"}]},{"given":"Monika","family":"Akbar","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,USA"}]},{"given":"Joseph T.","family":"Aguayo","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory,USA"}]},{"given":"Mahmud Shahriar","family":"Hossain","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,USA"}]},{"given":"Tina M.","family":"Ellis","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory,USA"}]},{"given":"Siddhartha Shankar","family":"Das","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory,USA"}]},{"given":"Mohammad F.","family":"Babar","sequence":"additional","affiliation":[{"name":"Washington State University,USA"}]},{"given":"Monowar","family":"Hasan","sequence":"additional","affiliation":[{"name":"Washington State University,USA"}]},{"given":"Aaron","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Washington State University,USA"}]},{"given":"Luis Fernando","family":"de la Torre","sequence":"additional","affiliation":[{"name":"Washington State University,USA"}]},{"given":"Mahantesh","family":"Halappanavar","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"National Vulnerability Database (NVD)","volume-title":"National Institute of Standards and Technology (NIST), 2005\u20132025, comprehensive repository of standards-based vulnerability management data"},{"key":"ref2","article-title":"Common Vulnerabilities and Exposures (CVE)","volume-title":"MITRE, 1999\u20132025, publicly disclosed cybersecurity vulnerabilities"},{"key":"ref3","article-title":"MITRE Corporation","volume-title":"Nonprofit organization managing federally funded research and development centers (FFRDCs)","year":"1958-2025"},{"key":"ref4","article-title":"Common Weakness Enumeration (CWE)","volume-title":"MITRE, 2006-2025, community-developed catalog of software and hardware weakness types"},{"key":"ref5","article-title":"Common Attack Pattern Enumeration and Classification (CAPEC)","volume-title":"MITRE, 2007-2025, catalog of adversary attack patterns"},{"key":"ref6","article-title":"Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)","volume-title":"MITRE, 2013-2025, knowledge base of adversary tactics, techniques, and procedures"},{"key":"ref7","article-title":"Common Platform Enumeration (CPE)","volume-title":"National Institute of Standards and Technology (NIST), 2007-2025, standardized method of naming software, operating systems, and hardware platforms"},{"key":"ref8","article-title":"Common Vulnerability Scoring System (CVSS)","volume-title":"National Institute of Standards and Technology (NIST), 2005-2025, standardized framework for rating the severity of security vulnerabilities"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30796-7_13"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/3643662.3643962","article-title":"Building a cybersecurity knowledge graph with cybergraph","volume-title":"Proc. of EnCyCriS\/SVM","author":"Falcarin","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3641819"},{"key":"ref12","article-title":"Linking common vulnerabilities and exposures to the mitre att&ck framework: A selfdistillation approach","author":"Ampel","year":"2021","journal-title":"arXiv preprint arXiv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA53316.2021.9564227"},{"key":"ref14","article-title":"Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting","author":"Hemberg","year":"2020","journal-title":"arXiv preprint arXiv"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8883696"},{"key":"ref16","volume-title":"Toward a knowledge graph of cybersecurity countermeasures (d3fend)","author":"Kaloroumakis","year":"2019"},{"key":"ref17","article-title":"Cykg-rag: Towards knowledge-graph enhanced retrieval for cybersecurity","volume-title":"Proceedings of CEUR Workshop on Knowledge-Augmented AI","author":"Kurniawan","year":"2025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2172\/2474934"},{"key":"ref19","volume-title":"Link Prediction Algorithms - Neo4j Graph Data Science Library","year":"2025"},{"key":"ref20","volume-title":"Moody\u2019s says mgm breach is credit negative as disruption lingers","year":"2023"},{"key":"ref21","volume-title":"People\u2019s republic of china state-sponsored cyber actor living off the land to evade detection","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Data Mining Workshops (ICDMW)","location":"Washington, DC, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,15]]}},"container-title":["2025 IEEE International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11415623\/11415713\/11416114.pdf?arnumber=11416114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:19:16Z","timestamp":1773206356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11416114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icdmw69685.2025.00140","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}