{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:32:49Z","timestamp":1757309569463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"European Union?s Horizon (H2020)","award":["675320"],"award-info":[{"award-number":["675320"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339282","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Building Taxonomies based on Human-Machine Teaming"],"prefix":"10.1145","author":[{"given":"Mohamad Imad","family":"Mahaini","sequence":"first","affiliation":[{"name":"School of Computing, University of Kent, Canterbury, UK"}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, Canterbury, UK"}]},{"given":"Rahime Belen","family":"Sa\u011flam","sequence":"additional","affiliation":[{"name":"Computer Engineering Department Ankara Y\u0131ld\u0131r\u0131m Beyaz\u0131t University, Ankara, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"Structures for Organizing Knowledge: Exploring Taxonomies, Ontologies, and Other Schema","author":"Abbas June","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217919"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663883"},{"key":"e_1_3_2_1_4_1","first-page":"106","article-title":"New Comprehensive Taxonomies on Mobile Security and Malware Analysis","volume":"5","author":"Canbek G\u00fcrol","year":"2016","journal-title":"International Journal of Information Security"},{"volume-title":"Proceedings of the 16th European Conference on Artificial Intelligence. IOS Press, 435--439","year":"2004","author":"Cimiano Philipp","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"R. Danyliw. 2016. The Incident Object Description Exchange Format Version 2. IETF RFC 7970. https:\/\/tools.ietf.org\/html\/rfc7970  R. Danyliw. 2016. The Incident Object Description Exchange Format Version 2. IETF RFC 7970. https:\/\/tools.ietf.org\/html\/rfc7970","DOI":"10.17487\/RFC7970"},{"volume-title":"Ministry of Defence, UK.","year":"2018","author":"Development","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04840-1_10"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.46"},{"key":"e_1_3_2_1_11_1","unstructured":"Will Gibb. 2013. Back to Basics Series: OpenIOC. https:\/\/www.fireeye.com\/blog\/threat-research\/2013\/09\/basics-series-openioc.html  Will Gibb. 2013. Back to Basics Series: OpenIOC. https:\/\/www.fireeye.com\/blog\/threat-research\/2013\/09\/basics-series-openioc.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.011"},{"key":"e_1_3_2_1_13_1","first-page":"2018","article-title":"Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary","volume":"27000","author":"IEC.","year":"2018","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2018.00029"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.020159"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"e_1_3_2_1_18_1","unstructured":"New Idea Engineering Inc. 2018. What's the difference between Taxonomies and Ontologies? - Ask Dr. Search. http:\/\/www.ideaeng.com\/taxonomies-ontologies-0602  New Idea Engineering Inc. 2018. What's the difference between Taxonomies and Ontologies? - Ask Dr. Search. http:\/\/www.ideaeng.com\/taxonomies-ontologies-0602"},{"key":"e_1_3_2_1_19_1","unstructured":"OASIS Open. 2019. Introduction to STIX. https:\/\/oasis-open.github.io\/cti-documentation\/stix\/intro  OASIS Open. 2019. Introduction to STIX. https:\/\/oasis-open.github.io\/cti-documentation\/stix\/intro"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186178"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1658822.1658842"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.175"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.007"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3288339.3288351"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1687878.1687918"},{"volume-title":"Proceedings of 2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing. IEEE, 395--400","author":"Andrei","key":"e_1_3_2_1_27_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339282"}},"subtitle":["Cyber Security as an Example"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":26,"alternative-id":["10.1145\/3339252.3339282","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339282","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}