{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:12:09Z","timestamp":1746191529126,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/ntms.2016.7792484","type":"proceedings-article","created":{"date-parts":[[2016,12,24]],"date-time":"2016-12-24T12:24:56Z","timestamp":1482582296000},"page":"1-5","source":"Crossref","is-referenced-by-count":10,"title":["Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence"],"prefix":"10.1109","author":[{"given":"Charles","family":"Wheelus","sequence":"first","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]},{"given":"Xingquan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70063-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/2627534.2627557","article-title":"Big data classification: problems and challenges in network intrusion prediction with machine learning","volume":"41","author":"suthaharan","year":"2014","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"key":"ref13","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proc 17th USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187306"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2014.72"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.34"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"114s","DOI":"10.1016\/j.diin.2014.05.012","article-title":"Multidimensional investigation of source port 0 probing","volume":"11","author":"elias","year":"2014","journal-title":"Digital Investigation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2297678"},{"key":"ref6","article-title":"Machine learning based research for network intrusion detection: A state-of-the-art","volume":"3","author":"patel","year":"2014","journal-title":"International Journal of Information and Network Security (IJINS)"},{"key":"ref5","first-page":"74","article-title":"Big data analytics for security","author":"alvaro","year":"2013","journal-title":"IEEE Security & Privacy"},{"key":"ref8","first-page":"65","article-title":"Proactive wrangling: mixed-initiative end-user programming of data transformation scripts","author":"gou","year":"2011","journal-title":"Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.01.016"},{"journal-title":"Ongoing Sophisticated Malware Campaign Compromising ICS","article-title":"Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) U.S. Department of Homeland Security","year":"2016","key":"ref1"},{"key":"ref9","article-title":"Data wrangling: The challenging yourney from the wild to the lake","author":"terrizzano","year":"2015","journal-title":"Biennial Conference on Innovative Data Systems Research"}],"event":{"name":"2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2016,11,21]]},"location":"Larnaca","end":{"date-parts":[[2016,11,23]]}},"container-title":["2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7791100\/7792416\/07792484.pdf?arnumber=7792484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T12:37:28Z","timestamp":1583498248000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7792484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ntms.2016.7792484","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}