{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:18Z","timestamp":1750307418995,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,21]],"date-time":"2010-04-21T00:00:00Z","timestamp":1271808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007000","name":"Laboratory Directed Research and Development","doi-asserted-by":"publisher","award":["DE-AC06-76RLO-1830"],"award-info":[{"award-number":["DE-AC06-76RLO-1830"]}],"id":[{"id":"10.13039\/100007000","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,21]]},"DOI":"10.1145\/1852666.1852740","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["An organic model for detecting cyber-events"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Oehmen","sequence":"first","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Elena","family":"Peterson","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Scott","family":"Dowson","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2836(05)80360-2"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/25.17.3389"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.112"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022596"},{"key":"e_1_3_2_2_5_1","unstructured":"J. Risch D. Rex S. Dowson T. Walters R. May and B. Moon \"The STARLIGHT Information Visualization System \" in IEEE International Information Visualization Conference (IV '97) London England 1997.   J. Risch D. Rex S. Dowson T. Walters R. May and B. Moon \"The STARLIGHT Information Visualization System \" in IEEE International Information Visualization Conference (IV '97) London England 1997."}],"event":{"name":"CSIIRW '10: Annual Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '10","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852666.1852740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:41Z","timestamp":1750246781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,21]]},"references-count":5,"alternative-id":["10.1145\/1852666.1852740","10.1145\/1852666"],"URL":"https:\/\/doi.org\/10.1145\/1852666.1852740","relation":{},"subject":[],"published":{"date-parts":[[2010,4,21]]},"assertion":[{"value":"2010-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}