{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:24Z","timestamp":1750220364587,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3465767","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Virtual Knowledge Graphs for Federated Log Analysis"],"prefix":"10.1145","author":[{"given":"Kabul","family":"Kurniawan","sequence":"first","affiliation":[{"name":"Vienna University of Economics and Business, Austria"}]},{"given":"Andreas","family":"Ekelhart","sequence":"additional","affiliation":[{"name":"Secure Business Austria, Austria"}]},{"given":"Elmar","family":"Kiesling","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business, Austria"}]},{"given":"Dietmar","family":"Winkler","sequence":"additional","affiliation":[{"name":"TU Vienna, Austria"}]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}]},{"given":"A Min","family":"Tjoa","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. ATT&CK Matrix for Enterprise. https:\/\/attack.mitre.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Trevor\u00a0J Bihl Robert\u00a0J Gutierrez Kenneth\u00a0W Bauer Bradley\u00a0C Boehmke and Cade Saie. [n.d.]. Topological Data Analysis for Enhancing Embedded Analytics for Enterprise Cyber Log Analysis and Forensics. In Cybersecurity and Privacy in Government. 10. https:\/\/doi.org\/10.24251\/HICSS.2020.238","DOI":"10.24251\/HICSS.2020.238"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61033-7_9"},{"key":"e_1_3_2_1_4_1","unstructured":"Anton Chuvakin Kevin Schmidt and Chris Phillips. 2012. Logging and log management: the authoritative guide to understanding the concepts surrounding logging and log management. Newnes."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.09.011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2013.01.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1548512911399303"},{"volume-title":"Advances in Security Information Management: Perceptions and Outcomes","author":"Guillermo Su\u00e1rez\u00a0de Tangil Esther\u00a0Palomar","key":"e_1_3_2_1_8_1","unstructured":"Esther\u00a0Palomar Guillermo Su\u00e1rez\u00a0de Tangil. 2013. Advances in Security Information Management: Perceptions and Outcomes. Nova Science Publishers, Incorporated, Commack, NY, USA."},{"key":"e_1_3_2_1_9_1","volume-title":"W3C recommendation 21, 10","author":"Harris Steve","year":"2013","unstructured":"Steve Harris, Andy Seaborne, and Eric Prud\u2019hommeaux. 2013. SPARQL 1.1 query language. W3C recommendation 21, 10 (2013), 778."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.109"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30796-7_13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi5030355"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45861-1_10"},{"key":"e_1_3_2_1_14_1","volume-title":"SEC","author":"Kurniawan Kabul","year":"2020","unstructured":"Kabul Kurniawan, Elmar Kiesling, Andreas Ekelhart, and Fajar Ekaputra. 2020. Cross-Platform File System Activity Monitoring and Forensics \u2013 A Semantic Approach. In H\u00f6lbl M., Rannenberg K., Welzer T. (eds) ICT Systems Security and Privacy Protection. SEC 2020. IFIP Advances in Information and Communication Technology. Springer, Cham."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3031317"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076466"},{"key":"e_1_3_2_1_17_1","volume-title":"RESTful Correlation and Consolidation of Distributed Logging Data in Cloud Environments. In The Eighth International Conference on Internet and Web Applications and Services. 7.","author":"Pape Christian","year":"2013","unstructured":"Christian Pape, Sven Reissmann, and Sebastian Rieger. 2013. RESTful Correlation and Consolidation of Distributed Logging Data in Cloud Environments. In The Eighth International Conference on Internet and Web Applications and Services. 7."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_16"},{"key":"e_1_3_2_1_19_1","unstructured":"Florian Skopik and Roman Fiedler. 2013. Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation. In GI-Jahrestagung. 15."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00668-6_15"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/777"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1162\/dint_a_00011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6824985"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","acronym":"ARES 2021","location":"Vienna Austria"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3465767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3465767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:29Z","timestamp":1750191449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3465767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":23,"alternative-id":["10.1145\/3465481.3465767","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3465767","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}