{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:30:01Z","timestamp":1764588601124,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NUS-NCS Joint Laboratory for Cyber Security","award":["A-0008542-00-00"],"award-info":[{"award-number":["A-0008542-00-00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691392","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4979-4981","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster:\n            <i>\n              M\n              <sup>2<\/sup>\n              ASK:\n            <\/i>\n            A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&amp;CK Mapping"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7758-932X","authenticated-orcid":false,"given":"Qiaoran","family":"Meng","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3414-4696","authenticated-orcid":false,"given":"Nay","family":"Oo","sequence":"additional","affiliation":[{"name":"NCS Cyber Special Ops-R&amp;D, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4791-8452","authenticated-orcid":false,"given":"Yuning","family":"Jiang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7830-3007","authenticated-orcid":false,"given":"Hoon Wei","family":"Lim","sequence":"additional","affiliation":[{"name":"NCS Cyber Special Ops-R&amp;D, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3325061.3325062"},{"unstructured":"Ross Heenan and Naghmeh Moradpoor. 2016. Introduction to Security Onion. http:\/\/researchrepository.napier.ac.uk\/Output\/461935","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins Eric M","year":"2011","unstructured":"Eric M Hutchins, Michael J Cloppert, Rohan M Amin, et al. 2011. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, Vol. 1, 1 (2011), 80.","journal-title":"Leading Issues in Information Warfare & Security Research"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/TDSC.2021.3117348"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.18653\/v1\/S18--1142"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.cose.2014.10.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.cose.2011.12.012"},{"volume-title":"Technical report","author":"Strom Blake E","unstructured":"Blake E Strom, Andy Applebaum, Doug P Miller, Kathryn C Nickels, Adam G Pennington, and Cody B Thomas. 2018. MITRE ATT&CK: Design and philosophy. In Technical report. The MITRE Corporation.","key":"e_1_3_2_1_8_1"},{"volume-title":"Emerging Threats Open Suricata 5.0 Rules Database","author":"Threats Emerging","unstructured":"Emerging Threats. 2023. Emerging Threats Open Suricata 5.0 Rules Database. Proofpoint Inc. https:\/\/rules.emergingthreats.net\/open\/suricata-5.0\/","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TrustCom53373.2021.00106"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '24","name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:55:41Z","timestamp":1755842141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":10,"alternative-id":["10.1145\/3658644.3691392","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691392","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}