{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3084162","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"119-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Robert","family":"Luh","sequence":"first","affiliation":[{"name":"Josef Ressel Center TARGET &amp; De Montfort University Leicester, St. P\u00f6lten, Austria"}]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[{"name":"Josef Ressel Center TARGET, St. P\u00f6lten, Austria"}]},{"given":"Stefan","family":"Marschalek","sequence":"additional","affiliation":[{"name":"Josef Ressel Center TARGET, St. P\u00f6lten, Austria"}]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[{"name":"De Montfort University Leicester, Leicester, United Kingdom"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_2_1","first-page":"80","article-title":"Intelligence driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins Eric M.","year":"2011","unstructured":"Eric M. Hutchins , Michael J. Cloppert , and Rohan M. Amin . 2011 . Intelligence driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains . Leading Issues in Information Warfare & Security Research 1 (2011), 80 . Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin. 2011. Intelligence driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1 (2011), 80.","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"e_1_3_2_1_3_1","volume-title":"The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1-2","author":"Kuhn Harold W","year":"1955","unstructured":"Harold W Kuhn . 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1-2 ( 1955 ), 83--97. Harold W Kuhn. 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1-2 (1955), 83--97."},{"key":"e_1_3_2_1_4_1","volume-title":"Semantics-aware detection of targeted attacks: a survey. Journal of Computer Virology and Hacking Techniques","author":"Luh Robert","year":"2016","unstructured":"Robert Luh , Stefan Marschalek , Manfred Kaiser , Helge Janicke , and Sebastian Schrittwieser . 2016. Semantics-aware detection of targeted attacks: a survey. Journal of Computer Virology and Hacking Techniques ( 2016 ), 1--39. Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, and Sebastian Schrittwieser. 2016. Semantics-aware detection of targeted attacks: a survey. Journal of Computer Virology and Hacking Techniques (2016), 1--39."},{"key":"e_1_3_2_1_5_1","volume-title":"Sequitur-based Inference and Analysis Framework for Malicious System Behavior. In 1st International Workshop on FORmal methods for Security Engineering, ICISSP.","author":"Luh Robert","year":"2017","unstructured":"Robert Luh , Gregor Schramm , Markus Wagner , and Sebastian Schrittwieser . 2017 . Sequitur-based Inference and Analysis Framework for Malicious System Behavior. In 1st International Workshop on FORmal methods for Security Engineering, ICISSP. Robert Luh, Gregor Schramm, Markus Wagner, and Sebastian Schrittwieser. 2017. Sequitur-based Inference and Analysis Framework for Malicious System Behavior. In 1st International Workshop on FORmal methods for Security Engineering, ICISSP."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011157"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006205203970402"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011217"},{"key":"e_1_3_2_1_9_1","volume-title":"31st IEEE International Conference on Advanced Information Networking and Applications (AINA).","author":"Robert Luh Sebastian Schrittwieser","year":"2017","unstructured":"Sebastian Schrittwieser Robert Luh and Stefan Marschalek . 2017 . LLR-based sentiment analysis for kernel event sequences . In 31st IEEE International Conference on Advanced Information Networking and Applications (AINA). Sebastian Schrittwieser Robert Luh and Stefan Marschalek. 2017. LLR-based sentiment analysis for kernel event sequences. In 31st IEEE International Conference on Advanced Information Networking and Applications (AINA)."}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084162","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084162"}},"subtitle":["Design of an Anomaly-based Threat Detection &amp; Explication System"],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":9,"alternative-id":["10.1145\/3078861.3084162","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3084162","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}