{"labels":{"en":"Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 3962"},"claims":{"P31":"Q13442814","P1433":null,"P1476":{"text":"Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-3962/paper62.pdf","P50":[],"P2093":[{"value":"Francesco Romeo","qualifiers":{"P1545":"1"}},{"value":"Francesco Blefari","qualifiers":{"P1545":"2"}},{"value":"Francesco Pironti","qualifiers":{"P1545":"3"}},{"value":"Angelo Furfaro","qualifiers":{"P1545":"4"}}]}}