{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:09:45Z","timestamp":1752984585100},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578801","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"129-133","source":"Crossref","is-referenced-by-count":28,"title":["A graph analytic metric for mitigating advanced persistent threat"],"prefix":"10.1109","author":[{"given":"John R.","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Emilie A.","family":"Hogan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Mechanics of User Identification and Authentication","year":"2003","author":"todorov","key":"17"},{"journal-title":"Special TrendLabs Primer on APTs","year":"2012","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","author":"newman","year":"2010","journal-title":"Networks An Introduction"},{"year":"0","key":"16"},{"journal-title":"Seven Deadliest Microsoft Attacks","year":"2010","author":"kraus","key":"13"},{"journal-title":"APT1 Exposing One of China's Cyber Espionage Units","year":"2013","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1515\/9781400833993","author":"jackson","year":"2008","journal-title":"Social and Economic Networks"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-88146-1","author":"kolaczyk","year":"2009","journal-title":"Statistical Analysis of Network Data Methods and Models"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1090\/cbms\/107","article-title":"Complex graphs and networks","author":"chung","year":"2006","journal-title":"Regional Conference Series in Mathematics"},{"year":"1997","author":"ashton","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791383"},{"key":"10","article-title":"Why crack when you can pass the hash","author":"hummel","year":"2009","journal-title":"Information Security Reading Room"},{"key":"7","article-title":"Pass-The-hash attacks: Tools and Mitigation","author":"ewaida","year":"2009","journal-title":"Information Security Reading Room"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/265910.265914"},{"key":"5","article-title":"Dynamic graph algorithms","author":"eppstein","year":"1999","journal-title":"Handbook of Algorithms and Theory of Computation"},{"journal-title":"Inward and Outward Node Accessibility in Complex Networks As Revealed by Non-Linear Dynamics","year":"0","author":"costa","key":"4"},{"journal-title":"Kerberos The Definitive Guide","year":"2003","author":"garman","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213855"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578801.pdf?arnumber=6578801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T19:04:06Z","timestamp":1596395046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578801","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}