{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:22Z","timestamp":1750221262655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T00:00:00Z","timestamp":1539043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea Internet Security Agency","award":["H2101-16-1001"],"award-info":[{"award-number":["H2101-16-1001"]}]},{"name":"National Research Foundation of Korea","award":["NRF-2018R1D1A3B07042380"],"award-info":[{"award-number":["NRF-2018R1D1A3B07042380"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,9]]},"DOI":"10.1145\/3264746.3264786","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T13:19:23Z","timestamp":1539263963000},"page":"160-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Ontology modeling for APT attack detection in an IoT-based power system"],"prefix":"10.1145","author":[{"given":"Gihoon","family":"Kim","sequence":"first","affiliation":[{"name":"Chosun University, Gwangju, South Korea"}]},{"given":"Chang","family":"Choi","sequence":"additional","affiliation":[{"name":"Chosun University, Gwangju, South Korea"}]},{"given":"Junho","family":"Choi","sequence":"additional","affiliation":[{"name":"Chosun University, Gwangju, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"3","article-title":"Smart Grid Concept","volume":"27","author":"Moon S.","year":"2010","journal-title":"Information & Communications Magazine"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/img.kisti.re.kr\/soc_img\/society\/kics\/GCSHBA\/2014\/v31n5\/GCSHBA_2014_v31n5_8.pdf  http:\/\/img.kisti.re.kr\/soc_img\/society\/kics\/GCSHBA\/2014\/v31n5\/GCSHBA_2014_v31n5_8.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"NIST. 2012. guide for conducting risk assessments: nist special publication 800--30 revision 1  NIST. 2012. guide for conducting risk assessments: nist special publication 800--30 revision 1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"C. Tankard. 2011. Advanced Persistent threats and how to monitor and deter them. Network security vol. 2011 no. 8 pp. 16--19.  C. Tankard. 2011. Advanced Persistent threats and how to monitor and deter them. Network security vol. 2011 no. 8 pp. 16--19.","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2014.24.5.839"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.69"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2014.24.3.491"},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/image.ahnlab.com\/file_upload\/tech\/IDS_1.pdf.  http:\/\/image.ahnlab.com\/file_upload\/tech\/IDS_1.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0980-1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900007797"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEPS.2014.6874179"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ENERGYCON.2016.7513991"}],"event":{"name":"RACS '18: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","KISM Korean Institute of Smart Media"],"location":"Honolulu Hawaii","acronym":"RACS '18"},"container-title":["Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264746.3264786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264746.3264786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:55Z","timestamp":1750212655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264746.3264786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,9]]},"references-count":12,"alternative-id":["10.1145\/3264746.3264786","10.1145\/3264746"],"URL":"https:\/\/doi.org\/10.1145\/3264746.3264786","relation":{},"subject":[],"published":{"date-parts":[[2018,10,9]]},"assertion":[{"value":"2018-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}