{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:06:24Z","timestamp":1729659984097,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578817","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"191-196","source":"Crossref","is-referenced-by-count":6,"title":["Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks"],"prefix":"10.1109","author":[{"given":"Josephine M.","family":"Namayanja","sequence":"first","affiliation":[]},{"given":"Vandana P.","family":"Janeja","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Anatomy of An Advanced Persistent Threat","year":"2010","author":"cutler","key":"19"},{"key":"17","first-page":"18","article-title":"Classification and Regression by randomForest","volume":"2","author":"liaw","year":"2002","journal-title":"R News"},{"journal-title":"Revealed Operation Shady RAT","year":"2011","author":"alperovitch","key":"18"},{"year":"0","key":"15"},{"key":"16","first-page":"201","article-title":"J48 and JRIP rules for e-governance data","volume":"5","author":"rajput","year":"2011","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0619-4","author":"bollobas","year":"1998","journal-title":"Modern Graph Theory"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"han","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532063"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"journal-title":"Google Hack Attack Was Ultra Sophisticated New Details Show","year":"2010","author":"zetter","key":"21"},{"journal-title":"Experts Google's 'Aurora' Hackers Still at It Years Later","year":"2012","author":"mills","key":"20"},{"journal-title":"Websense 2013 Threat Report Nearly 600 Percent Increase in Global Malicious Websites 85 Percent on Legitimate Sites","year":"2013","key":"22"},{"journal-title":"Assessing Outbound Traffic to Uncover Advanced Persistent Threat","year":"2011","author":"binde","key":"23"},{"journal-title":"Verizon Advanced Persistent Threat Is Overblown","year":"2011","author":"mcmillan","key":"24"},{"journal-title":"Advanced Persistent Threat Solution-No","year":"2010","key":"25"},{"journal-title":"What Ultimately Sets Triumfant Resolution Manager Apart Context","year":"2009","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807188"},{"journal-title":"A Comprehensive Survey of Data Mining-Based Fraud Detection Research","year":"2010","author":"phua","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"year":"0","key":"1"},{"journal-title":"The PageRank Citation Ranking","year":"1999","author":"page","key":"7"},{"journal-title":"Graph Theory","year":"1997","author":"diestel","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/00018730110112519"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.91"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1126\/science.1065103"},{"journal-title":"Characterization of Complex Networks","year":"2005","author":"costa","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578817.pdf?arnumber=6578817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:15Z","timestamp":1498078395000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578817","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}