{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:22Z","timestamp":1750308742941,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T00:00:00Z","timestamp":1193529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,28]]},"DOI":"10.1145\/1298406.1298410","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"7-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain"],"prefix":"10.1145","author":[{"given":"Asaf","family":"Shabtai","sequence":"first","affiliation":[{"name":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Maor","family":"Atlas","sequence":"additional","affiliation":[{"name":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Yuval","family":"Shahar","sequence":"additional","affiliation":[{"name":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2007,10,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1016\/0004-3702(84)90008-0"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc.of the 5th Innovative Applications of Artificial Intelligence Conference (IAAI--03)","author":"Barker K.","year":"2003","unstructured":"Barker K. A Knowledge Acquisition Tool for Course of Action Analysis , in Proc.of the 5th Innovative Applications of Artificial Intelligence Conference (IAAI--03) , 2003 . Barker K. et al. A Knowledge Acquisition Tool for Course of Action Analysis, in Proc.of the 5th Innovative Applications of Artificial Intelligence Conference (IAAI--03), 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/S0020-7373(87)80032-9"},{"key":"e_1_3_2_1_4_1","volume-title":"System Usability Scale (SUS): A Quick and--Dirty Method of System Evaluation User Information","author":"Brooke J.","year":"1986","unstructured":"Brooke J. System Usability Scale (SUS): A Quick and--Dirty Method of System Evaluation User Information . Digital Equipment Co Ltd , Reading, UK , 1986 . Brooke J. System Usability Scale (SUS): A Quick and--Dirty Method of System Evaluation User Information. Digital Equipment Co Ltd, Reading, UK, 1986."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-540-30202-5_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/S0169-023X(02)00137-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/S1386-5056(02)00072-2"},{"key":"e_1_3_2_1_8_1","volume-title":"Finland","author":"Shabtai A.","year":"2006","unstructured":"Shabtai A. , Shahar Y. and Elovici Y . Using the Knowledge-Based Temporal-Abstraction (KBTA) Method for Detection of Electronic Threats. the 5th European Con--ference on Information Warfare and Security (ECIW2006) , Finland , June 2006 . Shabtai A., Shahar Y. and Elovici Y. Using the Knowledge-Based Temporal-Abstraction (KBTA) Method for Detection of Electronic Threats. the 5th European Con--ference on Information Warfare and Security (ECIW2006), Finland, June 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"Brazil","author":"Shabtai A.","year":"2006","unstructured":"Shabtai A. , Shahar Y. and Elovici Y . Monitoring for Malware Using a Temporal-Abstraction Knowledge Base. the 8th International Symposium on Systems and Information Security (SSI2006) , Brazil , November 2006 . Shabtai A., Shahar Y. and Elovici Y. Monitoring for Malware Using a Temporal-Abstraction Knowledge Base. the 8th International Symposium on Systems and Information Security (SSI2006), Brazil, November 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1179576.1179580"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/0933-3657(95)00036-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/S0004-3702(96)00025-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1023\/A:1018998326167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1080\/095281399146643"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1136\/jamia.1999.0060494"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/0004-3702(87)90052-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/CIHSPS.2006.313291"}],"event":{"sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","ACM Association for Computing Machinery"],"acronym":"K-CAP07","name":"K-CAP07: International Conference on Knowledge Capture 2007","location":"Whistler BC Canada"},"container-title":["Proceedings of the 4th international conference on Knowledge capture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298406.1298410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298406.1298410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:14Z","timestamp":1750278134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298406.1298410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,28]]},"references-count":17,"alternative-id":["10.1145\/1298406.1298410","10.1145\/1298406"],"URL":"https:\/\/doi.org\/10.1145\/1298406.1298410","relation":{},"subject":[],"published":{"date-parts":[[2007,10,28]]},"assertion":[{"value":"2007-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}