{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:35Z","timestamp":1750220375104,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,17]]},"DOI":"10.1145\/3459955.3460592","type":"proceedings-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T09:05:53Z","timestamp":1627463153000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events"],"prefix":"10.1145","author":[{"given":"Masahito","family":"Kumazaki","sequence":"first","affiliation":[{"name":"Nagoya University, Japan"}]},{"given":"Hirokazu","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"Nagoya University, Japan"}]},{"given":"Yukiko","family":"Yamaguchi","sequence":"additional","affiliation":[{"name":"Nagoya University, Japan"}]},{"given":"Hajime","family":"Shimada","sequence":"additional","affiliation":[{"name":"Nagoya University, Japan"}]},{"given":"Hiroki","family":"Takakura","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,7,28]]},"reference":[{"volume-title":"Press Releases","year":"2020","author":"Communications 0.","key":"e_1_3_2_1_1_1"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"81","article-title":"Design principles for emergency response management systems","volume":"5","author":"Chen R","year":"2007","journal-title":"Journal of Information Systems and e-Business Management"},{"first-page":"37","volume-title":"Proceedings of the first workshop on Building Analysis Datasets and Gathering Experience Returns for Security","author":"Eto M","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"471","article-title":"Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)","volume":"2","author":"Kanemoto Y","year":"2019","journal-title":"IEEE"},{"volume-title":"2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 1-8.","author":"Lim H","key":"e_1_3_2_1_5_1"},{"first-page":"314","volume-title":"International Workshop on Recent Advances in Intrusion Detection. Springer","author":"Amann B","key":"e_1_3_2_1_6_1"},{"issue":"8","key":"e_1_3_2_1_7_1","first-page":"813","article-title":"U.S","author":"Magee J. C","year":"2014","journal-title":"Patent"},{"key":"e_1_3_2_1_8_1","first-page":"129","article-title":"Attack modeling and security evaluation in SIEM systems","volume":"8","author":"Kotenko I","year":"2012","journal-title":"International Transactions on Systems Science and Applications"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bryant B. D and Saiedian H. 2017. A novel kill-chain framework for remote security log analysis with SIEM software. computers & security 67. 198-210. https:\/\/doi.org\/10.1016\/j.cose.2017.03.003  Bryant B. D and Saiedian H. 2017. A novel kill-chain framework for remote security log analysis with SIEM software. computers & security 67. 198-210. https:\/\/doi.org\/10.1016\/j.cose.2017.03.003","DOI":"10.1016\/j.cose.2017.03.003"},{"first-page":"79","volume-title":"IFIP International Information Security Conference. Springer","author":"Colajanni M","key":"e_1_3_2_1_10_1"},{"volume-title":"Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. 49-56","author":"Wagner C","key":"e_1_3_2_1_11_1"}],"event":{"name":"ICISS 2021: 2021 The 4th International Conference on Information Science and Systems","acronym":"ICISS 2021","location":"Edinburgh United Kingdom"},"container-title":["2021 The 4th International Conference on Information Science and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459955.3460592","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459955.3460592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:43Z","timestamp":1750191463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459955.3460592"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,17]]},"references-count":11,"alternative-id":["10.1145\/3459955.3460592","10.1145\/3459955"],"URL":"https:\/\/doi.org\/10.1145\/3459955.3460592","relation":{},"subject":[],"published":{"date-parts":[[2021,3,17]]}}}