{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:49Z","timestamp":1750306129617,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T00:00:00Z","timestamp":1500422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,19]]},"DOI":"10.1145\/3102304.3102337","type":"proceedings-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T19:50:15Z","timestamp":1504900215000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["FLUKES"],"prefix":"10.1145","author":[{"given":"Monther","family":"Aldwairi","sequence":"first","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE"}]},{"given":"Hesham H.","family":"Alsaadi","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSWAN.2015.7209081"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Monther Aldwairi and Rami Al-Salman. 2011. MALURLs: Malicious URLs Classification System (The best paper award) (Annual International Conference on Information Theory and Applications Canning). GSTF Digital Library (GSTF-DL). The best paper award.  Monther Aldwairi and Rami Al-Salman. 2011. MALURLs: Malicious URLs Classification System (The best paper award) (Annual International Conference on Information Theory and Applications Canning). GSTF Digital Library (GSTF-DL). The best paper award.","DOI":"10.5176\/978-981-08-8113-9_ITA29"},{"key":"e_1_3_2_1_3_1","first-page":"512","article-title":"Hybrid Pattern Matching Algorithm for Intrusion Detection Systems","volume":"6","author":"Aldwairi Monther","year":"2011","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.588"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Shadi Aljawarneh Monther Aldwairi and Muneer Bani Yassein. 2017. Anomaly based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science (2017).  Shadi Aljawarneh Monther Aldwairi and Muneer Bani Yassein. 2017. Anomaly based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science (2017).","DOI":"10.1016\/j.jocs.2017.03.006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1147"},{"key":"e_1_3_2_1_7_1","unstructured":"Beth Binde Russ McRee and Terrence J OfiConnor. 2011. Assessing outbound traffic to uncover advanced persistent threat. SANS Institute. Whitepaper (2011).  Beth Binde Russ McRee and Terrence J OfiConnor. 2011. Assessing outbound traffic to uncover advanced persistent threat. SANS Institute. Whitepaper (2011)."},{"volume-title":"SoutheastCon","year":"2016","author":"Boger Mark","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Mike Bostock. 2015. Data-Driven Documents. (2015). https:\/\/d3js.org\/  Mike Bostock. 2015. Data-Driven Documents. (2015). https:\/\/d3js.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Eoghan Casey. 2010. Handbook of Digital Forensics and Investigation. Vol. 3. Elsevier Academic Press Inc Oxford United Kingdom. 150--151 pages.   Eoghan Casey. 2010. Handbook of Digital Forensics and Investigation. Vol. 3. Elsevier Academic Press Inc Oxford United Kingdom. 150--151 pages."},{"key":"e_1_3_2_1_11_1","unstructured":"Inc Cisco Systems. 2009. User Guide for Cisco Security MARS Local and Global Controllers Release 6.x. (2009). http:\/\/www.cisco.com\/en\/US\/docs\/security\/security_management\/cs-mars\/6.0\/user\/guide\/combo\/bkMarsUgCombo.pdf  Inc Cisco Systems. 2009. User Guide for Cisco Security MARS Local and Global Controllers Release 6.x. (2009). http:\/\/www.cisco.com\/en\/US\/docs\/security\/security_management\/cs-mars\/6.0\/user\/guide\/combo\/bkMarsUgCombo.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"Hewlett Packard Enterprise. 2016. Announcing HPE Security ArcSight Data Platform solution. (2016). http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA6-5106ENW.pdf  Hewlett Packard Enterprise. 2016. Announcing HPE Security ArcSight Data Platform solution. (2016). http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA6-5106ENW.pdf"},{"key":"e_1_3_2_1_13_1","unstructured":"Apache Software Foundation. 2012. Data flow model. (2012). https:\/\/flume.apache.org\/FlumeDeveloperGuide.htmll  Apache Software Foundation. 2012. Data flow model. (2012). https:\/\/flume.apache.org\/FlumeDeveloperGuide.htmll"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517959"},{"key":"e_1_3_2_1_15_1","first-page":"299","article-title":"DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD","volume":"83","author":"Iswardani Ardymulya","year":"2016","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5296\/npa.v4i3.2069"},{"key":"e_1_3_2_1_17_1","article-title":"Security Framework Using Forensic Function and Log Management. In Applied Mechanics and Materials, Vol. 590","author":"Kim Nan Ju","year":"2014","journal-title":"Trans Tech Publications, 752--755."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016906"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456778"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694413.2694417"},{"key":"e_1_3_2_1_21_1","unstructured":"NETRESEC. 2012. U.S. National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) Netresec. (2012). http:\/\/www.netresec.com\/?page=MACCDC  NETRESEC. 2012. U.S. National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) Netresec. (2012). http:\/\/www.netresec.com\/?page=MACCDC"},{"key":"e_1_3_2_1_22_1","unstructured":"Mike Sconzo. 2012. Security Repo Snort Logs. (2012). http:\/\/www.secrepo.com\/tg\/tg_snort_fast.7z  Mike Sconzo. 2012. Security Repo Snort Logs. (2012). http:\/\/www.secrepo.com\/tg\/tg_snort_fast.7z"},{"volume-title":"VizSEC","year":"2007","author":"Taylor Teryl","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850801"}],"event":{"name":"ICFNDS '17: International Conference on Future Networks and Distributed Systems","sponsor":["LABSTICC Labsticc"],"location":"Cambridge United Kingdom","acronym":"ICFNDS '17"},"container-title":["Proceedings of the International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3102337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102304.3102337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:05Z","timestamp":1750217825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3102337"}},"subtitle":["Autonomous Log Forensics, Intelligence and Visualization Tool"],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":25,"alternative-id":["10.1145\/3102304.3102337","10.1145\/3102304"],"URL":"https:\/\/doi.org\/10.1145\/3102304.3102337","relation":{},"subject":[],"published":{"date-parts":[[2017,7,19]]},"assertion":[{"value":"2017-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}