{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:43:20Z","timestamp":1730274200490,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/isi.2018.8587399","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T23:00:33Z","timestamp":1545951633000},"page":"55-57","source":"Crossref","is-referenced-by-count":1,"title":["Attacklets: Modeling High Dimensionality in Real World Cyberattacks"],"prefix":"10.1109","author":[{"given":"Cuneyt G.","family":"Akcora","sequence":"first","affiliation":[]},{"given":"Jonathan Z.","family":"Bakdash","sequence":"additional","affiliation":[]},{"given":"Yulia R.","family":"Gel","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"given":"Laura R.","family":"Marusich","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"year":"2018","key":"ref11","article-title":"VCDB: VERIS Community Database"},{"year":"2018","key":"ref12","article-title":"VERIS: VocabularyforEventRecordingandIncidentSharing (VERIS)"},{"key":"ref13","first-page":"525","article-title":"A comparison of document clustering techniques","author":"steinbach","year":"2000","journal-title":"et al"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176347507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21236\/ADA431826"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3105760","article-title":"Efficient attack graph analysis through approximate inference","volume":"20","author":"sgandurra","year":"2017","journal-title":"ACM Trans Priv Secur (TOPS)"},{"article-title":"2018 Verizon Data Breach Investigations Report 11th edition","year":"2018","author":"widup","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12864"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2018,11,9]]},"location":"Miami, FL","end":{"date-parts":[[2018,11,11]]}},"container-title":["2018 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8575039\/8587309\/08587399.pdf?arnumber=8587399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T16:21:09Z","timestamp":1643300469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8587399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isi.2018.8587399","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}