{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:44Z","timestamp":1725797144205},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_14","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T16:39:43Z","timestamp":1135355983000},"page":"209-224","source":"Crossref","is-referenced-by-count":13,"title":["A Language Driven Intrusion Detection System for Event and Alert Correlation"],"prefix":"10.1007","author":[{"given":"Eric","family":"Totel","sequence":"first","affiliation":[]},{"given":"Bernard","family":"Vivinis","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference (ACSA C\u201901)","author":"F Cuppens","year":"2001","unstructured":"F. Cuppens. Managing alerts in multi-intrusion detection environment. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSA C\u201901), 2001."},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192000)","author":"F Cuppens","year":"2000","unstructured":"F. Cuppens and R. Ortalo. Lambda: A language to model a database for detection of attacks. In H. Debar, L. M\u00e9, and S. F. Wu, editors, Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192000), number 1907 in LNCS, pages 197\u2013216, October 2000."},{"key":"14_CR3","series-title":"Technical report","volume-title":"Intrusion detection exchange format data model","author":"H Debar","year":"2002","unstructured":"H. Debar, M. Huang, and D. Donahoo. Intrusion detection exchange format data model. Technical report, IETF, 2002."},{"key":"14_CR4","volume-title":"PhD thesis","author":"C Dousson","year":"1994","unstructured":"C. Dousson. Suivi d\u2019evolutions et reconnaissance de chroniques. PhD thesis, 1994."},{"key":"14_CR5","first-page":"501","volume-title":"Annales des Telecommunications","author":"C Dousson","year":"1996","unstructured":"C. Dousson. Alarm driven supervision for telecommunication networks. In Annales des Telecommunications, pages 501\u2013508, 1996."},{"key":"14_CR6","series-title":"Technical report","volume-title":"An introduction to logweaver","author":"J Goubault-Larrec","year":"2001","unstructured":"J. Goubault-Larrec. An introduction to logweaver. Technical report, LSV, 2001."},{"key":"14_CR7","series-title":"Technical report","volume-title":"DICO Project SP3.3: Detection algorithms and signature languages","author":"J Goubault-Larrec","year":"2003","unstructured":"J. Goubault-Larrec. DICO Project SP3.3: Detection algorithms and signature languages. Technical report, DICO Project, July 2003."},{"key":"14_CR8","first-page":"353","volume-title":"Proceedings of the 16th International Conference on Information Security (IFIP\/SEC 2001)","author":"C Michel","year":"2001","unstructured":"C. Michel and L. M\u00e9. ADeLe: an attack description language for knowledgebased intrusion detection. In Proceedings of the 16th International Conference on Information Security (IFIP\/SEC 2001), pages 353\u2013365, June 2001."},{"key":"14_CR9","volume-title":"6th International Conference on Recent Advances in Intrusion Detection (RAID\u201903)","author":"B Morin","year":"2003","unstructured":"B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In 6th International Conference on Recent Advances in Intrusion Detection (RAID\u201903), September 2003."},{"key":"14_CR10","volume-title":"5th International Conference on Recent Advances in Intrusion Detection (RAID\u201902)","author":"B Morin","year":"2002","unstructured":"B. Morin, L. M\u00e9, and H. Debar. M2D2 : A formal data model for IDS alert correlation. In 5th International Conference on Recent Advances in Intrusion Detection (RAID\u201902), October 2002."},{"key":"14_CR11","volume-title":"Proceedings of the Fourth International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192001)","author":"J-P Pouzol","year":"2001","unstructured":"J.-P. Pouzol and M. Ducass\u00e9. From declarative signatures to misuse ids. In W. Lee, L. M\u00e9, and A. Wespi, editors, Proceedings of the Fourth International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192001), LNCS, October 2001."},{"key":"14_CR12","first-page":"64","volume-title":"Proceedings of 15th Computer Security Foundations Workshop (CSFW\u201902)","author":"J-P Pouzol","year":"2002","unstructured":"J.-P. Pouzol and M. Ducass\u00e9. Formal specification of intrusion signatures and detection rules. In Proceedings of 15th Computer Security Foundations Workshop (CSFW\u201902), IEEE Computer Society Press, pages 64\u201376, 2002."},{"key":"14_CR13","volume-title":"Proceedings of the 4th International Symposium on the Recent Advances in Intrusion Detection (RAID\u20192001)","author":"A Valdes","year":"2001","unstructured":"A. Valdes and K. Skinner. Probabilistic alert correlation. In W. Lee, L. M\u00e9, and A. Wespi, editors, Proceedings of the 4th International Symposium on the Recent Advances in Intrusion Detection (RAID\u20192001), LNCS, October 2001."}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T03:48:18Z","timestamp":1549511298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_14","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}