{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:05Z","timestamp":1755882605876,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021797"],"award-info":[{"award-number":["101021797"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670880","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2673-3450","authenticated-orcid":false,"given":"Damian","family":"Puchalski","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8518-4440","authenticated-orcid":false,"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital forensics in cyber security\u2014recent trends, threats, and opportunities. Cybersecurity Threats with New Perspectives","author":"Alghamdi I","year":"2021","unstructured":"Mohammed\u00a0I Alghamdi. 2021. Digital forensics in cyber security\u2014recent trends, threats, and opportunities. Cybersecurity Threats with New Perspectives (2021)."},{"unstructured":"Cisco.com. [n. d.]. NetFlow version 9. https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/netflow-version-9\/index.html. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_2_1"},{"unstructured":"European\u00a0Commission CORDIS. 2024. Sustainable Autonomy and Resilience for LEAs using AI against High priority Threats. https:\/\/cordis.europa.eu\/project\/id\/101021797. (Accessed on 03\/11\/2024).","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3407023.3407068"},{"volume-title":"Apache kafka","author":"Garg Nishant","unstructured":"Nishant Garg. 2013. Apache kafka. Packt Publishing Birmingham, UK.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICSCEE50312.2021.9498226"},{"unstructured":"IBM. [n. d.]. OpenID Connect documentation. https:\/\/www.ibm.com\/docs\/pl\/was-liberty\/base?topic=liberty-openid-connect. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_7_1"},{"unstructured":"SANS Institute. 2002. Introduction to dsniff as part of GIAC practical repository. https:\/\/www.giac.org\/paper\/gsec\/810\/introduction-dsniff\/101714. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_8_1"},{"unstructured":"LiveAction.com. [n. d.]. Omnipeek - Network Protocol Analyzer. https:\/\/www.liveaction.com\/products\/omnipeek\/. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_9_1"},{"unstructured":"Xplico.org Open Source Network Forensic Analysis\u00a0Tool (NFAT). [n. d.]. Xplico documentation. https:\/\/www.xplico.org\/docs. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_10_1"},{"unstructured":"NIKSUN. [n. d.]. NetDetector. https:\/\/www.niksun.com\/netdetector.php. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_11_1"},{"unstructured":"OAuth.net. [n. d.]. OAuth 2.0. https:\/\/oauth.net\/2\/. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/3407023.3409181"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/s00779-021-01568-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.bushor.2021.07.010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/MTS.2020.3031848"},{"unstructured":"STIX Project. [n. d.]. About STIX. http:\/\/stixproject.github.io\/about\/. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.14569\/IJACSA.2021.01205103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ACCESS.2022.3214506"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/s41060-016-0027-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.fsidi.2019.200892"},{"unstructured":"Snort.org. 2024. Snort official documentation. https:\/\/www.snort.org\/documents\/OfficialDocumentation. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_22_1"},{"unstructured":"STARLIGHT. 2021. Enhancing the EU\u2019s strategic autonomy in the field of artificial intelligence (AI) for law enforcement agencies (LEAs). https:\/\/www.starlight-h2020.eu\/. (Accessed on 03\/11\/2024).","key":"e_1_3_2_1_23_1"},{"volume-title":"Technical report","author":"Strom E","unstructured":"Blake\u00a0E Strom, Andy Applebaum, Doug\u00a0P Miller, Kathryn\u00a0C Nickels, Adam\u00a0G Pennington, and Cody\u00a0B Thomas. 2018. Mitre att&ck: Design and philosophy. In Technical report. The MITRE Corporation.","key":"e_1_3_2_1_24_1"},{"unstructured":"Suricata.io. [n. d.]. Suricata documentation. https:\/\/suricata.io\/documentation\/. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_25_1"},{"unstructured":"tcpdump.org. [n. d.]. CPDUMP & LIBPCAP documentation. https:\/\/www.tcpdump.org\/index.html\/documentation. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_26_1"},{"unstructured":"Wireshark.org. [n. d.]. Wireshark documentation. https:\/\/www.wireshark.org\/docs\/. (Accessed on 03\/12\/2024).","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1016\/j.iot.2022.100544"}],"event":{"acronym":"ARES 2024","name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670880","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:13Z","timestamp":1755881713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670880"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":28,"alternative-id":["10.1145\/3664476.3670880","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670880","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}