{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:50:48Z","timestamp":1742388648509,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1109\/itnac55475.2022.9998358","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T14:05:35Z","timestamp":1672927535000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Al Mamun","sequence":"first","affiliation":[{"name":"School of Engineering and Computer Science, Victoria University of Wellington,Wellington,New Zealand"}]},{"given":"Harith","family":"Al-Sahaf","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Victoria University of Wellington,Wellington,New Zealand"}]},{"given":"Ian","family":"Welch","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Victoria University of Wellington,Wellington,New Zealand"}]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"Data61, CSIRO,Australia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"14","article-title":"How to own the internet in your spare time","volume-title":"USENIX Security Symposium","volume":"2","author":"Staniford","year":"2002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2573829"},{"volume-title":"What is an advanced persistent threat APT?","year":"2021","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-137"},{"issue":"4","key":"ref5","first-page":"52","article-title":"The cyber kill chain: A foundation for a new cyber security strategy","volume":"6","author":"Croom","year":"2010","journal-title":"High Frontier"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2016.7460498"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0716-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59621-7_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_9"},{"volume-title":"CSE-CIC-IDS2018 on AWS","year":"2021","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/832135"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/9789812561794_0019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820092"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11296"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511197"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.53"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1951-8_24"},{"key":"ref25","first-page":"319","article-title":"A real-time intrusion detection system based on PSO-SVM","volume-title":"Proceedings of the 2009 International Workshop on Information Security and Application","author":"Wang","year":"2009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.03.04"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2474-6"}],"event":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2022,11,30]]},"location":"Wellington, New Zealand","end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9998179\/9998326\/09998358.pdf?arnumber=9998358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:19:56Z","timestamp":1710357596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9998358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/itnac55475.2022.9998358","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]}}}