{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:02:35Z","timestamp":1725807755936},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icin.2019.8685841","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T01:09:10Z","timestamp":1555031350000},"page":"188-194","source":"Crossref","is-referenced-by-count":7,"title":["Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information"],"prefix":"10.1109","author":[{"given":"Francisco J.","family":"Aparicio-Navarro","sequence":"first","affiliation":[]},{"given":"Timothy A.","family":"Chadza","sequence":"additional","affiliation":[]},{"given":"Konstantinos G.","family":"Kyriakopoulos","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Ghafir","sequence":"additional","affiliation":[]},{"given":"Sangarapillai","family":"Lambotharan","sequence":"additional","affiliation":[]},{"given":"Basil","family":"AsSadhan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Snort 2 9 9 x on Ubuntu 14 and 16 with Barnyard2 PulledPork and BASE","year":"2018","author":"dietrich","key":"ref32"},{"journal-title":"Scan rules","year":"2018","author":"roesch","key":"ref31"},{"journal-title":"The Metasploit Framework","year":"2018","author":"metasploit","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358834"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170769"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2017.7934750"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2017.8090413"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.01.002"},{"key":"ref15","first-page":"216","article-title":"Modeling situation awareness for Army infantry platoon leaders using fuzzy cognitive mapping techniques","author":"jones","year":"2010","journal-title":"Proc of the Behavior Representation in Modeling and Simulation Conference (BRiMS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.61"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7514720"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939146"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30633-4_11"},{"journal-title":"Nmap - Free Security Scanner for Network","year":"2018","author":"lyon","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2013.6766352"},{"journal-title":"The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy","year":"2013","author":"engebretson","key":"ref3"},{"journal-title":"Kali Linux Penetration Testing and Ethical Hacking Linux Distribution","year":"2018","author":"aharoni","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"journal-title":"Open Vulnerability Assessment System","year":"2018","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599708"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762162"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24584-3_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0114"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.818878"},{"journal-title":"SNORT network intrusion detection system","year":"2018","key":"ref1"},{"journal-title":"Pulledpork","year":"2018","author":"cummings","key":"ref20"},{"journal-title":"Emerging Threats Rule Server","year":"2018","key":"ref22"},{"journal-title":"Snorpy 2 0 - Web Based Snort Rule Creator","year":"2018","author":"davis","key":"ref21"},{"journal-title":"tcpdump","year":"2018","author":"jacobson","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696"},{"journal-title":"Tcpreplay Pcap editing and replay tools for *NIX and Windows","year":"2018","author":"turner","key":"ref26"},{"journal-title":"TShark - The wireshark network analyser 2 4 6","year":"2018","author":"combs","key":"ref25"}],"event":{"name":"2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","start":{"date-parts":[[2019,2,19]]},"location":"Paris, France","end":{"date-parts":[[2019,2,21]]}},"container-title":["2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8681059\/8685837\/08685841.pdf?arnumber=8685841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:47:38Z","timestamp":1658080058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8685841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icin.2019.8685841","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}