{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:59Z","timestamp":1750306439623,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K03345X\/1"],"award-info":[{"award-number":["EP\/K03345X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2799979.2800037","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"165-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A classification framework for distinct cyber-attacks based on occurrence patterns"],"prefix":"10.1145","author":[{"given":"Malik S. K.","family":"Awan","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]},{"given":"Mohammed","family":"AlGhamdi","sequence":"additional","affiliation":[{"name":"Umm AlQura University, Makkah, KSA"}]},{"given":"Sultan","family":"AlMotiri","sequence":"additional","affiliation":[{"name":"Umm AlQura University, Makkah, KSA"}]},{"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]},{"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Network Security - Next Generation Firewalls by Palo Alto Networks. https:\/\/www.paloaltonetworks.com.  Network Security - Next Generation Firewalls by Palo Alto Networks. https:\/\/www.paloaltonetworks.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Palo Alto Networks: Wildfire datasheet. https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/wildfire\/wildfire.pdf.  Palo Alto Networks: Wildfire datasheet. https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/wildfire\/wildfire.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.65"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"e_1_3_2_1_5_1","first-page":"1846","volume-title":"Proc. of 2014 Int. Conf. on Information Science, Electronics and Electrical Engineering (ISEEE)","author":"C.","year":"2014","unstructured":"C. Tseng et. al. , Proactive malware collection and classification system: How to collect and classify useful malware samples? , Proc. of 2014 Int. Conf. on Information Science, Electronics and Electrical Engineering (ISEEE) , pp. 1846 -- 1849 , 2014 . C. Tseng et. al., Proactive malware collection and classification system: How to collect and classify useful malware samples?, Proc. of 2014 Int. Conf. on Information Science, Electronics and Electrical Engineering (ISEEE), pp. 1846--1849, 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of Int. Conf. on Privacy, Security, Risk and Trust","author":"Fruehwirt P.","year":"2014","unstructured":"P. Fruehwirt , S. Schrittwieser and E. R. Weippl , Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile , Proc. of Int. Conf. on Privacy, Security, Risk and Trust , 2014 . P. Fruehwirt, S. Schrittwieser and E. R. Weippl, Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile, Proc. of Int. Conf. on Privacy, Security, Risk and Trust, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of 3rd Int. Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)","author":"M.","year":"2014","unstructured":"M. Lindorfer et. al., Andrubis 1,000,00 0 Apps Later -- A View on Current Android Malware Behaviors , Proc. of 3rd Int. Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) , 2014 . M. Lindorfer et. al., Andrubis 1,000,000 Apps Later -- A View on Current Android Malware Behaviors, Proc. of 3rd Int. Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/977403.978389"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. 40th IEEE\/IFIP Int. Conf. Dependable Systems and Networks","author":"P.","year":"2010","unstructured":"P. Xie et. al., Using Bayesian Networks for Cyber Security Analysis , Proc. 40th IEEE\/IFIP Int. Conf. Dependable Systems and Networks , 2010 . P. Xie et. al., Using Bayesian Networks for Cyber Security Analysis, Proc. 40th IEEE\/IFIP Int. Conf. Dependable Systems and Networks, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"}],"event":{"name":"SIN '15: The 8th International Conference on Security of Information and Networks","acronym":"SIN '15","location":"Sochi Russia"},"container-title":["Proceedings of the 8th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2799979.2800037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:43Z","timestamp":1750225363000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":16,"alternative-id":["10.1145\/2799979.2800037","10.1145\/2799979"],"URL":"https:\/\/doi.org\/10.1145\/2799979.2800037","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}