{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:11Z","timestamp":1750220051514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3592830","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"1043-1045","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["POSTER: Security Logs Graph Analytics for Industry Network System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7758-932X","authenticated-orcid":false,"given":"Qiaoran","family":"Meng","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3414-4696","authenticated-orcid":false,"given":"Nay","family":"Oo","sequence":"additional","affiliation":[{"name":"NCS Cyber Special Ops-R&amp;D, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7830-3007","authenticated-orcid":false,"given":"Hoon Wei","family":"Lim","sequence":"additional","affiliation":[{"name":"NCS Cyber Special Ops-R&amp;D, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"eSentire. 2022. 2022 Cybercrime Report. https:\/\/www.esentire.com\/resources\/library\/2022-official-cybercrime-report  eSentire. 2022. 2022 Cybercrime Report. https:\/\/www.esentire.com\/resources\/library\/2022-official-cybercrime-report"},{"key":"e_1_3_2_1_2_1","first-page":"731","article-title":"Alert-Driven Attack Graph Generation Using S-PDFA","volume":"19","author":"Nadeem Azqa","year":"2022","unstructured":"Azqa Nadeem , Sicco Verwer , Stephen Moskal , and Shanchieh\u00a0Jay Yang . 2022 . Alert-Driven Attack Graph Generation Using S-PDFA . IEEE Transactions on Dependable and Secure Computing 19 , 2 (2022), 731 \u2013 746 . https:\/\/doi.org\/10.1109\/TDSC.2021.3117348 10.1109\/TDSC.2021.3117348 Azqa Nadeem, Sicco Verwer, Stephen Moskal, and Shanchieh\u00a0Jay Yang. 2022. Alert-Driven Attack Graph Generation Using S-PDFA. IEEE Transactions on Dependable and Secure Computing 19, 2 (2022), 731\u2013746. https:\/\/doi.org\/10.1109\/TDSC.2021.3117348","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"volume-title":"A Review of Graph Approaches to Network Security Analytics","author":"Noel Steven","key":"e_1_3_2_1_3_1","unstructured":"Steven Noel . 2018. A Review of Graph Approaches to Network Security Analytics . Springer International Publishing , Cham , 300\u2013323. https:\/\/doi.org\/10.1007\/978-3-030-04834-1_16 10.1007\/978-3-030-04834-1_16 Steven Noel. 2018. A Review of Graph Approaches to Network Security Analytics. Springer International Publishing, Cham, 300\u2013323. https:\/\/doi.org\/10.1007\/978-3-030-04834-1_16"},{"key":"#cr-split#-e_1_3_2_1_4_1.1","doi-asserted-by":"crossref","unstructured":"S. Noel E. Harley K.H. Tam M. Limiero and M. Share. 2016. Chapter 4 - CyGraph: Graph-Based Analytics and Visualization for Cybersecurity. In Cognitive Computing: Theory and Applications Venkat\u00a0N. Gudivada Vijay\u00a0V. Raghavan Venu Govindaraju and C.R. Rao (Eds.). Handbook of Statistics Vol.\u00a035. Elsevier 117-167. https:\/\/doi.org\/10.1016\/bs.host.2016.07.001 10.1016\/bs.host.2016.07.001","DOI":"10.1016\/bs.host.2016.07.001"},{"key":"#cr-split#-e_1_3_2_1_4_1.2","doi-asserted-by":"crossref","unstructured":"S. Noel E. Harley K.H. Tam M. Limiero and M. Share. 2016. Chapter 4 - CyGraph: Graph-Based Analytics and Visualization for Cybersecurity. In Cognitive Computing: Theory and Applications Venkat\u00a0N. Gudivada Vijay\u00a0V. Raghavan Venu Govindaraju and C.R. Rao (Eds.). Handbook of Statistics Vol.\u00a035. Elsevier 117-167. https:\/\/doi.org\/10.1016\/bs.host.2016.07.001","DOI":"10.1016\/bs.host.2016.07.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S18-1142"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:16Z","timestamp":1750183696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":6,"alternative-id":["10.1145\/3579856.3592830","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3592830","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}