{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:29Z","timestamp":1750221269558,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006228","name":"Oak Ridge National Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006228","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3138854","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2463-2465","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["DEMO"],"prefix":"10.1145","author":[{"given":"Jared M.","family":"Smith","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA"}]},{"given":"Elliot","family":"Greenlee","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA"}]},{"given":"Aaron","family":"Ferber","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Sonal Salve Swati Vamney Bhawna Nigam Poorvi Ahirwal. 2011. Document Classification Using Expectation Maximization with Semi Supervised Learning. (2011). https:\/\/arxiv.org\/abs\/1112.2028"},{"key":"e_1_3_2_1_2_1","unstructured":"CarbonBlack. 1999. (1999). http:\/\/www.carbonblack.com"},{"volume-title":"https:\/\/cuckoosandbox.org\/","year":"2017","key":"e_1_3_2_1_3_1","unstructured":"Cuckoo. 2017. Cuckoo. (2017). https:\/\/cuckoosandbox.org\/"},{"volume-title":"https:\/\/www.guidancesoftware.com\/ encase-forensic","year":"2017","key":"e_1_3_2_1_4_1","unstructured":"EndCase. 2017. EndCase. (2017). https:\/\/www.guidancesoftware.com\/ encase-forensic"},{"volume-title":"https:\/\/www.python.org\/","year":"2017","key":"e_1_3_2_1_5_1","unstructured":"Python Software Foundation. 2017. Python. (2017). https:\/\/www.python.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Volatility Foundation. 2017. Volatility. (2017). http:\/\/www.volatilityfoundation. org\/"},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/google\/grr","author":"GRR.","year":"2017","unstructured":"Google. 2017. GRR. (2017). https:\/\/github.com\/google\/grr"},{"key":"e_1_3_2_1_8_1","unstructured":"Google. 2017. Rekall. (2017). http:\/\/www.rekall-forensic.com\/"},{"key":"e_1_3_2_1_9_1","volume-title":"https: \/\/www.postgresql.org\/","author":"The PostgreSQL Global Development Group","year":"2017","unstructured":"The PostgreSQL Global Development Group. 2017. PostgreSQL. (2017). https: \/\/www.postgresql.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Tanium Inc. 1999. Endpoint Security and Systems. (1999). http:\/\/www.tanium. com"},{"key":"e_1_3_2_1_11_1","unstructured":"Ponemon Institute and IBM. 2017. Cost of Data Breach Study. (2017). https: \/\/www.ibm.com\/security\/data-breach\/"},{"key":"e_1_3_2_1_12_1","unstructured":"et al. Mika Sebastian. 1999. Fisher discriminant analysis with kernels. (1999). http:\/\/ieeexplore.ieee.org\/abstract\/document\/788121\/"},{"volume-title":"https:\/\/minio.io\/","year":"2017","key":"e_1_3_2_1_13_1","unstructured":"Minio. 2017. Minio. (2017). https:\/\/minio.io\/"},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/prometheus.io\/","author":"IO.","year":"2017","unstructured":"PrometheusIO. 2017. PrometheusIO. (2017). https:\/\/prometheus.io\/"},{"key":"e_1_3_2_1_15_1","unstructured":"J.R. Quinlan. 1993. C4.5: Programs for Machine Learning. (1993). http:\/\/dl.acm. org\/citation.cfm?id=152181"},{"key":"e_1_3_2_1_16_1","unstructured":"D. Ruta and B. Gabrys. 2000. An Overview of Classifier Fusion Methods. (2000). http:\/\/eprints.bournemouth.ac.uk\/9649\/"},{"volume-title":"https:\/\/www.splunk.com\/","year":"2017","key":"e_1_3_2_1_17_1","unstructured":"Splunk. 2017. Splunk. (2017). https:\/\/www.splunk.com\/"},{"key":"e_1_3_2_1_18_1","volume":"199","author":"Suykens A.K.","unstructured":"J.A.K. Suykens and J. Vandewalle. 1999. Least Squares Support Vector Machine Classifiers. (1999). https:\/\/link.springer.com\/article\/10.1023%2FA% 3A1018628609742?LI=true","journal-title":"J. Vandewalle."},{"key":"e_1_3_2_1_19_1","unstructured":"TheZoo. 2017. threZoo. (2017). https:\/\/github.com\/ytisf\/theZoo"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Hanna M. Wallach. 2006. Topic modeling: beyond bag-of-words. (2006). http:\/\/dl.acm.org\/citation.cfm?id=1143967","DOI":"10.1145\/1143844.1143967"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3138854","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3138854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:04Z","timestamp":1750212664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138854"}},"subtitle":["Akatosh: Automated Cyber Incident Verification and Impact Analysis"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":20,"alternative-id":["10.1145\/3133956.3138854","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3138854","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}