{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:01:03Z","timestamp":1762624863587,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"The Major Key Project of PCL","award":["PCL2021A02","PCL2022A03","PCL2021A09"],"award-info":[{"award-number":["PCL2021A02","PCL2022A03","PCL2021A09"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972106","62072131","61902082"],"award-info":[{"award-number":["61972106","62072131","61902082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2022A1515011401"],"award-info":[{"award-number":["2022A1515011401"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Projects in Guangzhou","award":["202102010442"],"award-info":[{"award-number":["202102010442"]}]},{"name":"National Key research and Development Plan","award":["2019QY1406"],"award-info":[{"award-number":["2019QY1406"]}]},{"DOI":"10.13039\/501100015956","name":"Special Project for Research and Development in Key areas of Guangdong Province","doi-asserted-by":"publisher","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}],"id":[{"id":"10.13039\/501100015956","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3201928","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:37:22Z","timestamp":1661542642000},"page":"4262-4272","source":"Crossref","is-referenced-by-count":8,"title":["A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-4437","authenticated-orcid":false,"given":"Yangyang","family":"Mei","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9997-1509","authenticated-orcid":false,"given":"Weihong","family":"Han","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6381-1984","authenticated-orcid":false,"given":"Shudong","family":"Li","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Kaihan","family":"Lin","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Cui","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref13","first-page":"965","article-title":"Feature selection and extraction for malware classification","volume":"31","author":"lin","year":"2015","journal-title":"J Inf Sci Eng"},{"year":"2016","journal-title":"APT-C-09 is targeted attack threats from Southeast Asia","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/JSEN.2022.3179165"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIM.2022.3159005"},{"year":"2020","journal-title":"Threat Group Cards A Threat Actor Encyclopedia","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/s00521-013-1341-y"},{"year":"2017","journal-title":"The latent elephant group&#x2014;Comes from cyber attacks in the subcontinent","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TMC.2018.2814052"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.knosys.2021.106988"},{"year":"2019","journal-title":"Going ATOMIC Clustering and associating attacker activity at scale","key":"ref2"},{"key":"ref1","first-page":"5054","article-title":"Advanced persistent threat attack detection: An overview","volume":"4","author":"ghafir","year":"2014","journal-title":"Int J Adv Comput Netw Secur"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.asoc.2016.12.052"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1155\/2021\/9396141"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3390\/ma8010117"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/en7085251"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/72.991427"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1961189.1961199"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/s11227-020-03233-x"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MHS.1995.494215"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/BF00994018"},{"key":"ref22","first-page":"219","article-title":"Support vector machines for multi-class pattern recognition","author":"weston","year":"1999","journal-title":"Proc Eur Symp Artif Neural Netw"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.procs.2017.06.004"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ACCESS.2020.3008211"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s00366-021-01299-6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.isatra.2010.06.005"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IAW.2004.1437851"},{"year":"2017","author":"cai","article-title":"APT detection based on temporal and spatial relevance analysis","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.21236\/ADA468859"},{"key":"ref4","first-page":"384","article-title":"Malware detection method based on active learning","volume":"28","author":"mao","year":"2017","journal-title":"J Softw"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1002\/ett.3884"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/s19122804"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.comnet.2016.05.018"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09868098.pdf?arnumber=9868098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:09:48Z","timestamp":1676934588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9868098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3201928","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}