{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:41:04Z","timestamp":1725601264679},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iri.2013.6642487","type":"proceedings-article","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T00:13:22Z","timestamp":1383178402000},"page":"309-316","source":"Crossref","is-referenced-by-count":2,"title":["Detecting data exfiltration by integrating information across layers"],"prefix":"10.1109","author":[{"given":"Puneet","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Metasploit The Penetration Testers Guide","year":"2011","author":"ogorman","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2002.994455"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"year":"0","key":"20"},{"key":"22","first-page":"1485","article-title":"Social EngineeringToolkita systematic approach to social engineering","author":"pavkovic","year":"2011","journal-title":"InMIPRO 2011 34th International Convention"},{"key":"23","article-title":"Behavior model for detecting data exfiltration in networkenvironment","author":"ramachandran","year":"2011","journal-title":"Conf on Internet MultimediaSystems Architecture and Application IEEE"},{"journal-title":"A Multilayer Framework to Catch Data Exfiltration","year":"2013","author":"sharma","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"journal-title":"Intrusion Detection Modeling SystemState to Detect and Classify Aberrant Behavior","year":"2004","author":"undercoffer","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000049"},{"key":"28","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-45248-5_7","article-title":"Modelingcomputer attacks: An ontology for intrusion detection","author":"undercoffer","year":"2003","journal-title":"6th Int Symp on Recent Advances in IntrusionDetection"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753210"},{"key":"10","first-page":"216","article-title":"A collaborative approach to situational awareness forcybersecurity","author":"mathews","year":"2012","journal-title":"8th Int Conf on Collaborative Computing Networking Applications and Worksharing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"5","article-title":"Usingembedded sensors for detecting network attacks","author":"kerschbaum","year":"2000","journal-title":"ACM Workshop on Intrusion Detection Systems"},{"key":"4","article-title":"Extractingcybersecurity related linked data from text","author":"joshi","year":"2013","journal-title":"SeventhIEEE International Conference on Semantic Computing"},{"key":"9","first-page":"1","article-title":"Sidd: A frameworkfor detecting sensitive data exfiltration by an insiderattack","author":"liu","year":"2009","journal-title":"42nd Hawaii Int Conf on System Sciences"},{"key":"8","article-title":"Learning patternsfrom unix process execution traces for intrusiondetection","author":"lee","year":"1997","journal-title":"AAAI Workshop on AI Approaches ToFraud Detection and Risk Management"}],"event":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2013,8,14]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 IEEE 14th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621630\/6642428\/06642487.pdf?arnumber=6642487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:07:39Z","timestamp":1498093659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6642487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iri.2013.6642487","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}