{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:51:01Z","timestamp":1725497461444},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578850","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"315-320","source":"Crossref","is-referenced-by-count":0,"title":["Graph analytics for signature discovery"],"prefix":"10.1109","author":[{"given":"Emilie","family":"Hogan","sequence":"first","affiliation":[]},{"given":"John R.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Mahantesh","family":"Halappanavar","sequence":"additional","affiliation":[]},{"given":"Chaomei","family":"Lo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2007","author":"cormen","journal-title":"Introduction to Algorithms","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1016\/j.parco.2012.07.001"},{"year":"2008","author":"costa","journal-title":"Inward and Outward Node Accessibility in Complex Networks As Revealed by Non-Linear Dynamics","key":"15"},{"year":"2006","author":"diestel","journal-title":"Graph Theory","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1137\/110855715"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1866835.1866853"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/265910.265914"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1017\/CBO9780511791383"},{"year":"1997","author":"bugtraq","journal-title":"NT 'Pass the Hash' with Modified SMB Client Vulnerability","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","author":"newman","year":"2010","journal-title":"Networks An Introduction"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1093\/acprof:oso\/9780199591756.001.0001"},{"year":"1999","author":"eppstein","journal-title":"Algorithms and Theoretical Computing Handbook","key":"10"},{"key":"7","article-title":"Complex graphs and networks. Regional conference series in mathematics","author":"chung","year":"2006","journal-title":"Conference Board of the Mathematical Sciences American Mathematical Society"},{"key":"6","article-title":"Why crack when you can pass the hash?","author":"hummel","year":"2009","journal-title":"Information Security Reading Room SANS Institute"},{"key":"5","article-title":"Seven deadliest microsoft attacks (seven deadliest attacks)","author":"kraus","year":"2010","journal-title":"Syngress Tech Rep"},{"key":"4","article-title":"Pass-The-hash attacks: Tools and mitigation","author":"ewaida","year":"2009","journal-title":"Information Security Reading Room SANS Institute"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-88146-1","author":"kolaczyk","year":"2009","journal-title":"Statistical Analysis of Network Data Methods and Models"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1515\/9781400833993","author":"jackson","year":"2008","journal-title":"Social and Economic Networks"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578850.pdf?arnumber=6578850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T19:03:44Z","timestamp":1596395024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578850","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}