{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:23:44Z","timestamp":1759937024865,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004725","name":"Ministry of Economic Affairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728949","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"34-39","source":"Crossref","is-referenced-by-count":8,"title":["Attack Tactic Labeling for Cyber Threat Hunting"],"prefix":"10.23919","author":[{"given":"Sheng-Xiang","family":"Lin","sequence":"first","affiliation":[{"name":"Cybersecurity Technology Institute, Institute for Information Industry,Taiwan,R.O.C"}]},{"given":"Zong-Jyun","family":"Li","sequence":"additional","affiliation":[{"name":"Cybersecurity Technology Institute, Institute for Information Industry,Taiwan,R.O.C"}]},{"given":"Tzu-Yang","family":"Chen","sequence":"additional","affiliation":[{"name":"Cybersecurity Technology Institute, Institute for Information Industry,Taiwan,R.O.C"}]},{"given":"Dong-Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Cybersecurity Technology Institute, Institute for Information Industry,Taiwan,R.O.C"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Finding Cyber Threats with ATT&CK-Based Analytics","author":"strom","year":"2017","journal-title":"The MITRE Corporation"},{"journal-title":"The MITRE Corporation","article-title":"MITRE ATT&CK&#x00AE;","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3474374.3486918"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162207"},{"key":"ref14","article-title":"TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured","author":"husari","year":"2017","journal-title":"Annual Computer Security Applications Conference (ACSAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3317728"},{"journal-title":"vlegoy\/rcATT A python app to predict Att&ck tactics and techniques from cyber threat reports","year":"0","author":"legoy","key":"ref16"},{"journal-title":"Unfetter Unfetter insight","year":"2018","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0006543301820189"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7536381"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101817"},{"key":"ref5","article-title":"The Unified Kill Chain","author":"pols","year":"2017","journal-title":"Cyber Security Academy (CSA)"},{"key":"ref8","article-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"hutchins","year":"2011","journal-title":"International Conference on Information Warfare and Security (ICIW)"},{"journal-title":"Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports","year":"2020","author":"legoy","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167239"},{"journal-title":"MAAC Novel Alert Correlation Method To Detect Multi-step Attack","year":"2020","author":"wang","key":"ref1"},{"key":"ref9","article-title":"MITRE ATT&CK: Design and Philosophy","author":"strom","year":"2018","journal-title":"The MITRE Corporation"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2022,2,13]]},"location":"PyeongChang Kwangwoon_Do, Korea, Republic of","end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728949.pdf?arnumber=9728949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:42:33Z","timestamp":1659660153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728949","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}