{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:22:53Z","timestamp":1775838173898,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,5]]},"DOI":"10.1109\/idsta55301.2022.9923170","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:58:32Z","timestamp":1667512712000},"page":"4-12","source":"Crossref","is-referenced-by-count":20,"title":["Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework"],"prefix":"10.1109","author":[{"given":"P","family":"Rajesh","sequence":"first","affiliation":[{"name":"KLEF University"}]},{"given":"Mansoor","family":"Alam","sequence":"additional","affiliation":[{"name":"Northern Illinois University"}]},{"given":"Mansour","family":"Tahernezhadi","sequence":"additional","affiliation":[{"name":"Northern Illinois University"}]},{"given":"A","family":"Monika","sequence":"additional","affiliation":[{"name":"SRES-COE"}]},{"given":"Gm","family":"Chanakya","sequence":"additional","affiliation":[{"name":"SVEC"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00150"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.53"},{"key":"ref5","volume-title":"A Flow-based Method for Abnormal Network Traffic Detection","author":"Kim","year":"2004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC49498.2019.9108886"},{"key":"ref7","volume-title":"2018 IEEE 4th International Conference on Collaboration and Internet Computing","author":"Ayoade"},{"key":"ref8","volume-title":"A Detailed Analysis of an Advanced Persistent Threat Malware","author":"Li","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.90"},{"key":"ref10","article-title":"Intelligence Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"Hutchins Eric","journal-title":"ICIW2011"},{"key":"ref11","article-title":"Threat intelligence: What it is, and how to use it effectively","volume":"15","author":"Bromiley","year":"2016","journal-title":"SANS Institute InfoSec Reading Room"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"ref13","first-page":"29","article-title":"Definition: Threat intelligence.[sl], 2013","author":"McMillan","year":"2013","journal-title":"Citado na"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"ref15","volume-title":"The pyramid of pain (2014)","author":"Bianco","year":"2013"},{"key":"ref16","first-page":"49","article-title":"Developing an ontology of the cyber security domain","author":"Obrst","year":"2012","journal-title":"STIDS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0017-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-019-00285-7"},{"issue":"3","key":"ref19","article-title":"Special Issue on Big Data Applications in Cyber Security and Threat Intelligence \u2013 Part 1","volume":"5","author":"Raymond Choo","year":"2019","journal-title":"IEEE TRANSACTIONS ON BIG DATA"},{"issue":"3","key":"ref20","first-page":"381","article-title":"Network Security Situation Awareness Framework based on Threat Intelligence","volume":"56","author":"Zhang","year":"2018","journal-title":"2018 Tech Science Press CMC"},{"issue":"1","key":"ref21","doi-asserted-by":"crossref","first-page":"371","DOI":"10.11591\/ijeecs.v10.i1.pp371-379","article-title":"Cyber Threat Intelligence \u2013 Issue and Challenges","volume":"10","author":"Abu","year":"2018","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"2","key":"ref22","first-page":"84","article-title":"Research on Intrusion Detection and Response: A Survey","volume":"1","author":"Kabiri","year":"2005","journal-title":"International Journal of Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823360"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985754"},{"key":"ref27","article-title":"Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives","volume-title":"13th International Conference on Wirtschaftsinformatik","author":"Sauerwein"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app10062140"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2741-3_5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2019.8821951"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"issue":"23","key":"ref32","first-page":"2249","article-title":"Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks","volume":"6","author":"Conteh","journal-title":"International Journal of Advanced Computer Research"},{"key":"ref33","first-page":"1553","volume-title":"Survey of Attack Projection, Prediction, and Forecasting in Cyber Security","author":"Husak","year":"2018"},{"issue":"5","key":"ref34","first-page":"390","article-title":"A Survey on Various Cyber Attacks and Their Classification","volume":"15","author":"Uma","year":"2013","journal-title":"International Journal of Network Security"},{"key":"ref35","article-title":"Cerebration of privacy preserving data mining algorithms","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","volume":"2","author":"Rajesh"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3459104.3459135"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32112-2_50"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00198"},{"issue":"6S","key":"ref39","first-page":"2277","article-title":"\u201d A Forensic Approach To Perform Android Device Analysis \u201d at National Women Conference on Technological Innovations","volume-title":"2019, International Journal of Recent Technology and Engineering (IJRTE)","volume":"7","author":"Rajesh"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162207"},{"issue":"2","key":"ref41","first-page":"0974","article-title":"quot;Privacy Preserving Data Mining by Implicit function theorem&quot","volume":"5","author":"Rajesh","year":"2013","journal-title":"IJNSA (International Journal of Network Security and Its Applications)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2381716.2381865"},{"key":"ref43","first-page":"13","article-title":"quot; Machine Learning and Statistical Analysis Techniques on Terrorism&quot","volume-title":"at The 6th International Conference onFuzzy Systems and DataMining","author":"Rajesh"},{"key":"ref44","first-page":"2249","article-title":"Privacy Preserving MFI Based Similarity Measure for Hierarchical Document Clustering&quot","volume":"CoRR abs\/1207.2900 2012","author":"Rajesh","journal-title":"Cornell University Journal"},{"key":"ref45","article-title":"Cyber Threat Dictionary Using MITRE ATT&CKMatrix and NIST CyberSecurity Framework Mapping","author":"Kwon","year":"2020"}],"event":{"name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","location":"San Antonio, TX, USA","start":{"date-parts":[[2022,9,5]]},"end":{"date-parts":[[2022,9,7]]}},"container-title":["2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9922954\/9923031\/09923170.pdf?arnumber=9923170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:27:18Z","timestamp":1706077638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9923170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/idsta55301.2022.9923170","relation":{},"subject":[],"published":{"date-parts":[[2022,9,5]]}}}