{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:40:51Z","timestamp":1762522851969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587857","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"192-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Digital Forensic Artifacts Data Enrichment Mechanism for Cyber Threat Intelligence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7148-9187","authenticated-orcid":false,"given":"Hyung-Woo","family":"Lee","sequence":"first","affiliation":[{"name":"Div. of Com. Eng. Hanshin Univ., Rep. of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029847"},{"key":"e_1_3_2_1_2_1","volume-title":"Early detection of the advanced persistent threat attack using performance analysis of deep learning","author":"Joloudari Hassannataj","year":"2020","unstructured":"Hassannataj Joloudari , J., Haderbadi, M., Mashmool, A., GhasemiGol, M., Shahab, S., and Mosavi, A. , \u201c Early detection of the advanced persistent threat attack using performance analysis of deep learning \u201d, arXiv e-prints, 2020 . Hassannataj Joloudari, J., Haderbadi, M., Mashmool, A., GhasemiGol, M., Shahab, S., and Mosavi, A., \u201cEarly detection of the advanced persistent threat attack using performance analysis of deep learning\u201d, arXiv e-prints, 2020."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","volume-title":"Communications and Multimedia Security. CMS","author":"C.","year":"2014","unstructured":"Chen, P., Desmet, L., Huygens, C. , \u201c A Study on Advanced Persistent Threats ,\u201d Communications and Multimedia Security. CMS 2014 , Lecture Notes in Computer Science , Vol. 8735 . Springer . Chen, P., Desmet, L., Huygens, C., \u201cA Study on Advanced Persistent Threats,\u201d Communications and Multimedia Security. CMS 2014, Lecture Notes in Computer Science, Vol. 8735. Springer."},{"volume-title":"Sensors","author":"Gonzalez-Granadillo Gustavo","key":"e_1_3_2_1_4_1","unstructured":"Gustavo Gonzalez-Granadillo , Susana Gonzalez-Zarzosa , Rodrigo Diaz , \u201c Security Information and Event Managment (SIEM): Analysis, Trends, and Usage in Critical Infrastructures ,\u201d Sensors , Vol. 21 , No. 14, 2021, Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Rodrigo Diaz, \u201cSecurity Information and Event Managment (SIEM): Analysis, Trends, and Usage in Critical Infrastructures,\u201d Sensors, Vol. 21, No. 14, 2021,"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v10.i1.pp371-379"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"137","article-title":"An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data","volume":"11","author":"Mohammed Hussam","year":"2016","unstructured":"Hussam Mohammed , Hathan Clarke , Fudong Li , \u201c An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data ,\u201d Journal of Digital Forensics, Security and Law, Vo. 11 , No. 2 , 2016 , pp. 137 - 152 . Hussam Mohammed, Hathan Clarke, Fudong Li, \u201cAn Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data,\u201d Journal of Digital Forensics, Security and Law, Vo. 11, No. 2, 2016, pp. 137-152.","journal-title":"Journal of Digital Forensics, Security and Law, Vo."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007905401060115"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.20465\/KIOTS.2016.2.3.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.147-154"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.2.2.99-108"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.6.1.1-8"},{"key":"e_1_3_2_1_13_1","unstructured":"MISP Open Source Threat Intelligence and Sharing Platform \u201chttps:\/\/www.misp-project.org\u201d.  MISP Open Source Threat Intelligence and Sharing Platform \u201chttps:\/\/www.misp-project.org\u201d."},{"key":"e_1_3_2_1_14_1","unstructured":"IntelMQ \u201chttps:\/\/intelmq.readthedocs.io\u201d.  IntelMQ \u201chttps:\/\/intelmq.readthedocs.io\u201d."},{"key":"e_1_3_2_1_15_1","unstructured":"TheHive \u201chttps:\/\/thehive-project.org\u201d.  TheHive \u201chttps:\/\/thehive-project.org\u201d."},{"key":"e_1_3_2_1_16_1","unstructured":"Cortex \u201chttps:\/\/github.com\/TheHive-Project\/Cortex\u201d.  Cortex \u201chttps:\/\/github.com\/TheHive-Project\/Cortex\u201d."},{"key":"e_1_3_2_1_17_1","unstructured":"Splunk \u201chttps:\/\/www.splunk.com\u201d.  Splunk \u201chttps:\/\/www.splunk.com\u201d."},{"key":"e_1_3_2_1_18_1","unstructured":"CyberTriage \u201chttps:\/\/www.cybertriage.com\u201d  CyberTriage \u201chttps:\/\/www.cybertriage.com\u201d"},{"key":"e_1_3_2_1_19_1","unstructured":"Google GRR \u201chttps:\/\/github.com\/google\/grr\u201d  Google GRR \u201chttps:\/\/github.com\/google\/grr\u201d"},{"key":"e_1_3_2_1_20_1","unstructured":"Elastic Security \u201chttps:\/\/www.elastic.co\/security\u201d  Elastic Security \u201chttps:\/\/www.elastic.co\/security\u201d"}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587857","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":20,"alternative-id":["10.1145\/3587828.3587857","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587857","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}