{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:48:17Z","timestamp":1725482897668},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410850"},{"type":"electronic","value":"9783540399452"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-39945-3_1","type":"book-chapter","created":{"date-parts":[[2007,4,14]],"date-time":"2007-04-14T02:38:33Z","timestamp":1176518313000},"page":"1-16","source":"Crossref","is-referenced-by-count":6,"title":["Better Logging through Formality"],"prefix":"10.1007","author":[{"given":"Chapman","family":"Flack","sequence":"first","affiliation":[]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,11,11]]},"reference":[{"key":"1_CR1","unstructured":"Matt Bishop. A standard audit trail format. In Proceedings of the 1995 National Information Systems Security Conference, pages 136\u2013145, Baltimore, Maryland, October 1995."},{"key":"1_CR2","unstructured":"Mark Crosbie, Bryn Dole, Todd Ellis, Ivan Krsul, and Eugene Spafford. IDIOT users guide. Technical Report TR-96-050, Purdue University, September 1996."},{"key":"1_CR3","unstructured":"J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996."},{"key":"1_CR4","unstructured":"John E. Hopcroft and Jeffrey D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979."},{"key":"1_CR5","series-title":"MS thesis","volume-title":"USTAT: A Real-Time Intrusion Detection System for UNIX","author":"K. Ilgun","year":"1992","unstructured":"Koral Ilgun. USTAT: A Real-Time Intrusion Detection System for UNIX. MS thesis, University of California, Santa Barbara, November 1992."},{"key":"1_CR6","unstructured":"SRI International. EMERALD website. http:\/\/www.sdl.sri.com\/emerald\/ , April 2000."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ulf Lindqvist and Phillip A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, October 1999.","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"1_CR8","series-title":"Solaris 2.6 edition","volume-title":"SunSHIELD Basic Security Module Guide","author":"Sun Microsystems","year":"1997","unstructured":"Sun Microsystems. SunSHIELD Basic Security Module Guide. Sun Microsystems, 901 San Antonio Road, Palo Alto, California, Solaris 2.6 edition, 1997. Part Number 802-5757-10."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. Domain names-concepts and facilities. STD 13, ISI, November 1987.","DOI":"10.17487\/rfc1034"},{"key":"1_CR10","series-title":"D.Sc. thesis","volume-title":"Languages and Tools for Rule-Based Distributed Intrusion Detection","author":"A. Mounji","year":"1997","unstructured":"Abdelaziz Mounji. Languages and Tools for Rule-Based Distributed Intrusion Detection. D.Sc. thesis, Universitaires Notre-Dame de la Paix Namur (Belgium), September 1997."},{"key":"1_CR11","unstructured":"Terence Parr. ANTLR website. http:\/\/www.antlr.org\/ , February 2000."},{"key":"1_CR12","unstructured":"Terence John Parr. Obtaining Practical Variants of LL(k) and LR(k) for k > 1 by Splitting the Atomic k-tuple. PhD thesis, Purdue University, August 1993."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Manfred Ruschitzka. Two-level grammars for data conversions. Future Generation Computer Systems, pages 373\u2013380, 1990.","DOI":"10.1016\/0167-739X(90)90037-E"},{"key":"1_CR14","unstructured":"Brian Tung. Common intrusion detection framework. http:\/\/www.gidos.org\/ , November 1999."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39945-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T05:34:46Z","timestamp":1556343286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39945-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410850","9783540399452"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-39945-3_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}