{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:06:00Z","timestamp":1772910360107,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","funder":[{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559514","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"15-20","source":"Crossref","is-referenced-by-count":13,"title":["ART: Automated Reclassification for Threat Actors based on ATT&amp;CK Matrix Similarity"],"prefix":"10.23919","author":[{"given":"Youngsup","family":"Shin","sequence":"first","affiliation":[]},{"given":"Kyoungmin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jemin Justin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"59","article-title":"Implementing Intrusion Kill Chain Strategies","volume":"5","author":"howard","year":"2020","journal-title":"Cyber Defense Rev"},{"key":"ref11","article-title":"[Special Report] APT Campaign &#x2018;Konni&#x2019; & &#x2018;Thallium(Kimsuky)","year":"2019","journal-title":"Found in Common"},{"key":"ref12","article-title":"THREAT GROUP CARDS: A THREAT ACTOR ENCYCLOPEDIA","year":"2019"},{"key":"ref13","article-title":"alpedia: a collaborative effort to inventorize the malware landscape","author":"plohmann","year":"2017","journal-title":"Proceedings of the Botconf"},{"key":"ref14","year":"2021","journal-title":"Malpedia"},{"key":"ref15","article-title":"MITRE ATT&CK&#x00AE;: Design and philosophy: Design and philosophy","author":"strom","year":"2018","journal-title":"Technical Report"},{"key":"ref16","first-page":"40","article-title":"Semantic similarity calculation method using information contents-based edge weighting","volume":"7","author":"jeong","year":"2017","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref17","first-page":"103","article-title":"Malware Similarity Analysis using API Sequence Alignments","volume":"4","author":"cho","year":"2014","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref18","article-title":"The Mitre Corporation: Enterprise Matrix - Windows (2021)","year":"2021","journal-title":"Technical Report"},{"key":"ref19","article-title":"First Round of MITRE ATT&CK&#x2122; Evaluations Released","author":"duff","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s11416-019-00342-x","article-title":"PenQuest: a gamified attacker\/defender meta model for cyber security assessment and education","volume":"16","author":"zibak","year":"2020","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref6","first-page":"16","article-title":"Location spoofing attack detection with pre-installed sensors in mobile devices","volume":"11","author":"wong","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoW UA)"},{"key":"ref5","year":"2020","journal-title":"ATT&CK"},{"key":"ref8","year":"2018","journal-title":"A guide to cyber attribution"},{"key":"ref7","first-page":"49","article-title":"Detection and Classification of Radio Frequency Jamming Attacks using Machine learning","volume":"11","author":"kasturi","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoW UA)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340528"},{"key":"ref1","article-title":"When Naming Cyber Threat Actors Does More Harm Than Good","author":"smeets","year":"2016"},{"key":"ref9","article-title":"North Korean Advanced Persistent Threat Focus: Kimsuky","year":"2020"},{"key":"ref20","year":"0"},{"key":"ref22","article-title":"Microsoft takes court action against fourth nation-state cyber-crime group","author":"burt","year":"2019"},{"key":"ref21","article-title":"Automated retrieval of att&ck tactics and techniques for cyber threat reports","author":"legoy","year":"2020"}],"event":{"name":"2021 World Automation Congress (WAC)","location":"Taipei, Taiwan","start":{"date-parts":[[2021,8,1]]},"end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559514.pdf?arnumber=9559514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:10:28Z","timestamp":1639429828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559514","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}