{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:59:17Z","timestamp":1771261157241,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1109\/iscc61673.2024.10733665","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:32:28Z","timestamp":1730395948000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction"],"prefix":"10.1109","author":[{"given":"Caio M. C.","family":"Viana","sequence":"first","affiliation":[{"name":"Aeronautics Institute of Technology,Computer Science Division,Brazil"}]},{"given":"Carlos H. G.","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Federal University of Ouro Preto,Department of Computing and Systems,Brazil"}]},{"given":"Fabricio","family":"Murai","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute,Data Science &amp; Computer Science,Worcester,MA,USA"}]},{"given":"Aldri","family":"Luiz Dos Santos","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais,Department of Computer Science,Brazil"}]},{"given":"Louren\u00e7o Alves Pereira","family":"J\u00fanior","sequence":"additional","affiliation":[{"name":"Aeronautics Institute of Technology,Computer Science Division,Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cybersecurity in 2022 \u2013 a fresh look at some very alarming stats","author":"Brooks","year":"2022"},{"key":"ref2","article-title":"What is ransomware as a service (raas)?","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24046"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24167"},{"key":"ref5","first-page":"2345","article-title":"SIGL: Securing software installations through deep graph learning","author":"Han","year":"2021","journal-title":"USENIX Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208815"},{"key":"ref7","first-page":"4355","article-title":"PROGRAPHER: An anomaly detection system based on provenance graph embedding","author":"Yang","year":"2023","journal-title":"USENIX Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978378"},{"key":"ref9","first-page":"1723","article-title":"Dependence-preserving data compaction for scalable forensic analysis","author":"Hossain","year":"2018","journal-title":"USENIX Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0808904106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"ref12","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"Mikolov","year":"2013","journal-title":"NeurIPS"},{"key":"ref13","article-title":"Evading provenance-based ML detectors with adversarial system actions","author":"Mukherjee","year":"2023","journal-title":"USENIX Security"},{"key":"ref14","article-title":"graph2vec: Learning distributed representations of graphs","author":"Narayanan","year":"2017","journal-title":"MLG@KDD"},{"key":"ref15","article-title":"Data mining concepts and techniques third edition","author":"Han","year":"2012","journal-title":"University of Illinois at Urbana-Champaign Micheline Kamber Jian Pei Simon Fraser University"},{"key":"ref16","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton","year":"2017","journal-title":"NeurIPS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3101649"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3391800.3398175"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0274218"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60975-7_19"},{"key":"ref22","article-title":"Transparent computing engagement 3","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24207"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101188"}],"event":{"name":"2024 IEEE Symposium on Computers and Communications (ISCC)","location":"Paris, France","start":{"date-parts":[[2024,6,26]]},"end":{"date-parts":[[2024,6,29]]}},"container-title":["2024 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10733347\/10733557\/10733665.pdf?arnumber=10733665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:38:45Z","timestamp":1732689525000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10733665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscc61673.2024.10733665","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]}}}