{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:09:25Z","timestamp":1763536165720,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10225758","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"130-134","source":"Crossref","is-referenced-by-count":2,"title":["A Survey: Threat Hunting for the OT Systems"],"prefix":"10.1109","author":[{"given":"Ashraf","family":"Abzakh","sequence":"first","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]},{"given":"Ahmad AA","family":"Alkhatib","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]},{"given":"Omar","family":"Rabayah","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]},{"given":"Shorouq","family":"Elmanaseer","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]},{"given":"Rand N","family":"Albustanji","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]},{"given":"Nagham","family":"Almadi","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Amman,Jordan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036728"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3329581"},{"key":"ref11","first-page":"1","article-title":"Role of artificial intelligence in the Internet of Things (IoT) cybersecurity","volume":"1","author":"kuzlu","year":"2021","journal-title":"Internet of Things-discovery"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops53856.2022.9767375"},{"journal-title":"What is threat hunting? A look at past present and future of cyber hunting","year":"2019","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT52682.2021.9491743"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04772-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1063\/5.0109674"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(19)30074-1"},{"journal-title":"MITRE ATT\/CKTM","year":"2022","key":"ref3"},{"journal-title":"Automating cyber threat hunting using NLP automated query generation and genetic perturbation","year":"2021","author":"karuna","key":"ref6"},{"journal-title":"Turning the Hunted into the Hunter via Threat Hunting Life Cycle Ecosystem Challenges and the Great Promise of AI","year":"2022","author":"hillier","key":"ref5"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10225758.pdf?arnumber=10225758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:08Z","timestamp":1695058988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10225758","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}