{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:20:56Z","timestamp":1727065256340},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"the Ministry of Internal Affairs and Communications Japan.","award":["Research and development on IoT malware removal \/"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3041837","type":"journal-article","created":{"date-parts":[[2020,12,2]],"date-time":"2020-12-02T21:17:05Z","timestamp":1606943825000},"page":"217977-217986","source":"Crossref","is-referenced-by-count":33,"title":["Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5614-2276","authenticated-orcid":false,"given":"Muhamad Erza","family":"Aminanto","sequence":"first","affiliation":[]},{"given":"Tao","family":"Ban","sequence":"additional","affiliation":[]},{"given":"Ryoichi","family":"Isawa","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2019","journal-title":"Common Event Expression–CEE a Unified Event Language for Interoperability"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2013.48"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2013.27"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2013.6947748"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"ref15","article-title":"Detecting anomalous user behavior using an extended isolation forest algorithm: An enterprise case study","author":"sun","year":"2016","journal-title":"arXiv 1609 06676"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-CN-3020.00044"},{"key":"ref17","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"tuor","year":"2017","journal-title":"Proc Workshops 31st AAAI Conf Artif Intell"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"ref19","first-page":"212","article-title":"Improving detection of Wi-Fi impersonation by fully unsupervised deep learning","author":"aminanto","year":"2017","journal-title":"Proc Int Workshop Inf Secur Appl"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949029"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.028"},{"key":"ref3","author":"ulevitch","year":"2017","journal-title":"CISCO 2017 Annual Cybersecurity Report The Hidden Danger of Uninvestigated Threats"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CASON.2011.6085959"},{"key":"ref5","first-page":"756","article-title":"Combating threat-alert Fatigue with online anomaly detection using isolation forest","author":"aminanto","year":"2019","journal-title":"Proc Neural Inf Process (ICONIP)"},{"key":"ref8","year":"2017","journal-title":"Mcafee Enterprise Security Manager 10 2 0 Product Guide (Unmanaged)"},{"key":"ref7","year":"2016","journal-title":"Log Event Extended Format (LEEF)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4765"},{"key":"ref1","author":"unit42","year":"2020","journal-title":"2020 Unit 42 IoT Threat Report"},{"key":"ref20","article-title":"System and method for providing common event format using alert index","author":"marwaha","year":"2006"},{"key":"ref22","article-title":"Classification assessment methods","author":"tharwat","year":"2018","journal-title":"Applied Computing and Informatics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00002"},{"key":"ref23","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(00)00065-0"},{"key":"ref25","author":"cochrane","year":"2018","journal-title":"Time series nested cross-validation"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09276411.pdf?arnumber=9276411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:21:52Z","timestamp":1643149312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9276411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3041837","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}