{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:17:12Z","timestamp":1740100632491,"version":"3.37.3"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728789","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"271-274","source":"Crossref","is-referenced-by-count":2,"title":["APT attack response system through AM-HIDS"],"prefix":"10.23919","author":[{"given":"Seoung-Pyo","family":"Hong","sequence":"first","affiliation":[{"name":"Dongseo University,Department of Ubiquitous IT,Busan,Republic of Korea,47011"}]},{"given":"Chae-Ho","family":"Lim","sequence":"additional","affiliation":[{"name":"Bitscan INC,Seoul,Republic of Korea,04789"}]},{"given":"Hoon Jae","family":"Lee","sequence":"additional","affiliation":[{"name":"Dongseo University,Division of computer engineering,Busan,Republic of Korea,47011"}]}],"member":"263","reference":[{"journal-title":"Dong","article-title":"Aegis-Submarine Design Diagram, Stolen by China Hacker","year":"2017","key":"ref4"},{"journal-title":"BBC News","article-title":"Five Hacks Showing North Korea&#x2019;s Cyber Warfare Capabilities","year":"2017","key":"ref3"},{"journal-title":"Fireeye","article-title":"M-Trends 2019: Celebrating 10 Years of Incident Response Reporting","year":"2019","key":"ref6"},{"journal-title":"HANIC","article-title":"95,000 military hacking attempts a day","year":"2009","key":"ref5"},{"journal-title":"Command Five","article-title":"Advanced Persistent Threats: A Decade in Review","year":"2011","key":"ref8"},{"key":"ref7","first-page":"63","article-title":"APT status and new malicious code countermeasure","volume":"24","author":"lim","year":"2014","journal-title":"Information Security and Society"},{"journal-title":"The New York Times","article-title":"The U.S.Hits the 9-Million Mark as Infections Keep Surging","year":"2020","key":"ref2"},{"journal-title":"Trustwave","article-title":"The Cybersecurity Skils Crisis in Numbers","year":"2016","key":"ref1"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2022,2,13]]},"location":"PyeongChang Kwangwoon_Do, Korea, Republic of","end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728789.pdf?arnumber=9728789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T23:17:31Z","timestamp":1653952651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":8,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728789","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}