{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:13:48Z","timestamp":1730283228433,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599852","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"70-75","source":"Crossref","is-referenced-by-count":3,"title":["A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs"],"prefix":"10.1109","author":[{"given":"Richard B.","family":"Garcia-Lebron","sequence":"first","affiliation":[]},{"given":"Kristin M.","family":"Schweitzer","sequence":"additional","affiliation":[]},{"given":"Raymond M.","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.06.004"},{"key":"ref32","first-page":"967","article-title":"Using machine learning techniques to identify botnet traffic","author":"livadas","year":"2006","journal-title":"Proc IEEE LCN Workshop on Network Security (WoNS'2006)"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-30143-1_3","article-title":"Honeystat: Local worm detection using honeypots","author":"dagon","year":"2004","journal-title":"Proc Symp Recent Advances in Intrusion Detection (RAID'04)"},{"key":"ref30","article-title":"A dos resilient flow-level intrusion detection approach for high-speed networks","author":"gao","year":"2006","journal-title":"Proc IEEE ICDCS'06"},{"key":"ref37","article-title":"Detecting targeted attacks using shadow honeypots","author":"anagnostakis","year":"2005","journal-title":"Proc Usenix Security Symposium"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972384"},{"key":"ref34","article-title":"A systematic characterization of im threats using honeypots","author":"polakis","year":"2010","journal-title":"NDSS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/0900000004"},{"key":"ref40","article-title":"Malware in the future? forecasting analyst detection of cyber events","volume":"abs 1707 3243","author":"bakdash","year":"2017","journal-title":"CoRR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/2983481"},{"journal-title":"Modelling arma time series processes The farma package","year":"2017","author":"wuertz","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1198\/jbes.2010.09153"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0124472"},{"key":"ref15","first-page":"1","article-title":"Modeling and predicting extreme cyber attack rates via marked point processes","volume":"0","author":"peng","year":"2016","journal-title":"Journal of Applied Statistics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600190"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600189"},{"key":"ref18","first-page":"1","article-title":"A vine copula model for predicting the effectiveness of cyber defense early-warning","volume":"0","author":"xu","year":"2016","journal-title":"Technometrics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3005714"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2017.8286734"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029216"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/02664763.2018.1436701"},{"key":"ref6","article-title":"A virtual honeypot framework","author":"provos","year":"2004","journal-title":"Proc Usenix Security Symposium"},{"key":"ref29","article-title":"Empirical analysis and statistical modeling of attack processes based on honeypots","volume":"abs 704 861","author":"ka\u00e2niche","year":"2007","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2824443"},{"key":"ref8","article-title":"Yaf: Yet another flowmeter","author":"inacio","year":"2010","journal-title":"LISA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495929"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422261"},{"journal-title":"The Caret Package","year":"2009","author":"kuhn","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279800"},{"key":"ref20","first-page":"105","article-title":"A characterization of cybersecurity posture from network telescope data","author":"zhan","year":"2014","journal-title":"Proc of the 6th International Conference on Trustworthy Systems (InTrust'14)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065712500050"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834227"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2009.9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705629"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2086445"},{"key":"ref26","first-page":"79","article-title":"Extracting inter-arrival time based behaviour from honeypot traffic using cliques","author":"almotairi","year":"2007","journal-title":"5th Australian Digital Forensics Conference"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2008.82"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599852.pdf?arnumber=8599852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:19:50Z","timestamp":1643156390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599852","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}