{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T15:53:42Z","timestamp":1762012422881,"version":"build-2065373602"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688266","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T02:09:15Z","timestamp":1555034955000},"page":"202-212","source":"Crossref","is-referenced-by-count":7,"title":["An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks"],"prefix":"10.1109","author":[{"given":"Sina","family":"Pournouri","sequence":"first","affiliation":[{"name":"Sheffield Hallam University, UK"}]},{"given":"Shahrzad","family":"Zargari","sequence":"additional","affiliation":[{"name":"Sheffield Hallam University, UK"}]},{"given":"Babak","family":"Akhgar","sequence":"additional","affiliation":[{"name":"Sheffield Hallam University, UK"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Caret package","volume":"28","author":"kuhn","year":"2008","journal-title":"Journal of Statistical Software"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/0471687545.ch5"},{"key":"ref12","article-title":"Naive bayes classifiers","author":"murphy","year":"2006","journal-title":"University of British Columbia"},{"journal-title":"Hackmageddon","year":"0","author":"passeri","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23276-8_3"},{"key":"ref15","first-page":"155","article-title":"Cyber attacks analysis using decision tree technique for improving cyber situational awareness. In","author":"pournouri","year":"2017","journal-title":"International Conference on Global Security Safety and Sustainability"},{"journal-title":"C4 5 Programs for Machine Learning Morgan Koufmann","year":"1993","author":"quinlan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2016.7556119"},{"journal-title":"6 Easy Steps to Learn Naive Bayes Algorithm (with codes in Python and R)","year":"2015","author":"ray","key":"ref18"},{"journal-title":"Pearson's Correlation Coefficient","year":"2012","author":"sedgwick","key":"ref19"},{"key":"ref4","first-page":"273","volume":"20","author":"cortes","year":"1995","journal-title":"Support-vector Networks Machine Learning"},{"journal-title":"Random Forests-classification Description","year":"2007","author":"breiman","key":"ref3"},{"key":"ref6","first-page":"124","article-title":"The alternating decision tree learning algorithm","volume":"99","author":"freund","year":"1999","journal-title":"In ICML"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00180-008-0119-7"},{"key":"ref7","first-page":"404","article-title":"A recursive partitioning decision rule for nonparametric classification","author":"friedman","year":"1976","journal-title":"IEEE Trans Comput 26(SLAC-PUB-1573-REV)"},{"journal-title":"Cyber-thieves 'target Black Friday'","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0731-7085(99)00272-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref20","volume":"7","author":"stalder","year":"2002","journal-title":"Open source intelligence First Monday"},{"journal-title":"Data Mining Concepts Methods and Applications in Management and Engineering Design","year":"2011","author":"yin","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"rpart: Recursive partitioning","volume":"3","author":"therneau","year":"2010","journal-title":"R Package Version"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","start":{"date-parts":[[2019,1,16]]},"location":"London, UK","end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688266.pdf?arnumber=8688266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:18:56Z","timestamp":1755800336000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688266","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}