{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:49:16Z","timestamp":1747284556786},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.5220\/0010918200003120","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T17:11:25Z","timestamp":1644945085000},"page":"587-594","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Attack Stage Tracing System based on Attack Scenario Comparison"],"prefix":"10.5220","author":[{"given":"Masahito","family":"Kumazaki","sequence":"first","affiliation":[{"name":"Graduate School of Informatics, Nagoya University, Nagoya, Japan, --- Select a Country ---"}]},{"given":"Hirokazu","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"Information Security Office, Nagoya University, Nagoya, Japan, --- Select a Country ---"}]},{"given":"Yukiko","family":"Yamaguchi","sequence":"additional","affiliation":[{"name":"Information Technology Center, Nagoya University, Nagoya, Japan, --- Select a Country ---"}]},{"given":"Hajime","family":"Shimada","sequence":"additional","affiliation":[{"name":"Information Technology Center, Nagoya University, Nagoya, Japan, --- Select a Country ---"}]},{"given":"Hiroki","family":"Takakura","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Research and Development, National Institute of Informatics, Tokyo, Japan, --- Select a Country ---"}]}],"member":"3171","event":{"name":"8th International Conference on Information Systems Security and Privacy","start":{"date-parts":[[2022,2,9]]},"location":"Online Streaming, --- Select a Country ---","end":{"date-parts":[[2022,2,11]]}},"container-title":["Proceedings of the 8th International Conference on Information Systems Security and Privacy"],"original-title":["Cyber Attack Stage Tracing System based on Attack Scenario Comparison"],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T16:51:12Z","timestamp":1656694272000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0010918200003120"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0010918200003120","relation":{},"subject":[],"published":{"date-parts":[[2022]]}}}