{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:13:05Z","timestamp":1730283185782,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599708","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"1-9","source":"Crossref","is-referenced-by-count":17,"title":["Multi-Stage Attack Detection Using Contextual Information"],"prefix":"10.1109","author":[{"given":"Franciso J.","family":"Aparicio-Navarro","sequence":"first","affiliation":[]},{"given":"Konstantinos G.","family":"Kyriakopoulos","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Ghafir","sequence":"additional","affiliation":[]},{"given":"Sangarapillai","family":"Lambotharan","sequence":"additional","affiliation":[]},{"given":"Jonathon A.","family":"Chambers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.61"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4631676"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110809"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7514720"},{"key":"ref14","first-page":"87","article-title":"Security analysis as software-defined security for SDN environment","author":"el","year":"2017","journal-title":"4th IEEE International Conference on on Software Defined Systems (SDS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30633-4_11"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275911"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0302"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2855078"},{"key":"ref4","first-page":"34","article-title":"Advanced persistent threat and spear phishing emails","author":"ghafir","year":"2015","journal-title":"Proc of the Intl Conf Distance Learning Simulation and Communication"},{"journal-title":"Tcpreplay Pcap editing and replay tools for *NIX and Windows","year":"2018","author":"turner","key":"ref27"},{"key":"ref3","first-page":"50","article-title":"Advanced persistent threat attack detection: an overview","volume":"4","author":"ghafir","year":"2014","journal-title":"International Journal of Advances in Computer Networks and Its Security (IJCNS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762162"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2013.6766352"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.818878"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.01.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"ref9","first-page":"216","article-title":"Modeling situation awareness for Army infantry platoon leaders using fuzzy cognitive mapping techniques","author":"jones","year":"2010","journal-title":"Proceedings of the Conference on Behavioral Representation in Modeling and Simulation"},{"journal-title":"The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy","year":"2013","author":"engebretson","key":"ref1"},{"key":"ref20","first-page":"1265","article-title":"Incorporating the human analyst into the data fusion process by modeling situation awareness using fuzzy cognitive maps","author":"jones","year":"2009","journal-title":"Proc 5th Int Conf Information Fusion (FUSION)"},{"journal-title":"Nmap The network mapper-Free security scanner","year":"2016","author":"lyon","key":"ref22"},{"journal-title":"Kali Linux Penetration Testing and Ethical Hacking Linux Distribution","year":"2018","author":"aharoni","key":"ref21"},{"journal-title":"The Metasploit Framework","year":"2018","author":"metasploit","key":"ref24"},{"journal-title":"Greenbone","year":"2018","key":"ref23"},{"journal-title":"TShark - The wireshark network analyser 2 4 6","year":"2018","author":"combs","key":"ref26"},{"journal-title":"tcpdump","year":"1987","author":"jacobson","key":"ref25"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599708.pdf?arnumber=8599708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:56:40Z","timestamp":1643155000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599708","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}