{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:47:53Z","timestamp":1760597273162,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410850"},{"type":"electronic","value":"9783540399452"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-39945-3_13","type":"book-chapter","created":{"date-parts":[[2007,4,14]],"date-time":"2007-04-14T06:38:33Z","timestamp":1176532713000},"page":"197-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":150,"title":["LAMBDA: A Language to Model a Database for Detection of Attacks"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"first","affiliation":[]},{"given":"Rodolphe","family":"Ortalo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,11,11]]},"reference":[{"key":"13_CR1","unstructured":"Feiertag, R., Kahn, Porras, Schnackenberg, D., Staniford-Chen, S., Tung, B., \u201cA Common Intrusion Specification Language (CISL)\u201d, Common Intrusion Detection Framework (CIDF) working group, June 11, 1999."},{"key":"13_CR2","unstructured":"Debar, H., Huang, M. and Donahoo, D., \u201cIntrusion Detection Exchange Format Data Model\u201d, draft-ietf-idwg-data-model-02.txt, Internet Draft, IDWG, Internet Engineering Task Force, March 7, 2000, work in progress."},{"key":"13_CR3","unstructured":"Wood, M., \u201cIntrusion Detection Message Exchange Requirements\u201d, draft-ietf-idwg-requirements-02.txt, Internet Draft, IDWG, Internet Engineering Task Force, October 21, 1999, work in progress."},{"key":"13_CR4","unstructured":"Curry, D., \u201cIntrusion Detection Message Exchange Format Extensible Markup Language (XML) Document Type Definition\u201d, draft-ietf-idwg-idmef-xml-01.txt, Internet Draft, IDWG, Internet Engineering Task Force, March 15, 2000, work in progress."},{"key":"13_CR5","unstructured":"W. Baldwin Robert, Su-Kuang: Rule-based Security Checking, Technical report, Programming Systems Research Group, Lab. for Computer Science, MIT, May 1994."},{"key":"13_CR6","unstructured":"Zerkle, D. and Levitt, K., \u201cNetKuang-a Multi-Host Configuration Vulnerability Checker\u201d, in 6th USENIX Security Symposium, San Jose, CA, USA, July 1996."},{"key":"13_CR7","unstructured":"Ming-Yuh Huang, Thomas W. Wicks, \u201cA Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis\u201d, First International Workshop on the Recent Advances in Intrusion Detection RAID\u201998, Louvain-la-Neuve, Belgium, September 14\u201316, 1998."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Sadri, F. and Kowalski, R., \u201cVariants of the event calculus\u201d, Proc. of ICLP, MIT Press, 1995.","DOI":"10.7551\/mitpress\/4298.003.0017"},{"key":"13_CR9","unstructured":"A. Mounji and B. Le Charlier, \u201cContinuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis\u201d, in Proceedings of the ISOC\u201997 Symposium on Network and Distributed System Security, San Diego, USA, February 1997."},{"key":"13_CR10","series-title":"PhD thesis","volume-title":"Languages and Tools for Rule-Based Distributed Intrusion Detection","author":"A. Mounji","year":"1997","unstructured":"A. Mounji, Languages and Tools for Rule-Based Distributed Intrusion Detection, PhD thesis, Computer Science Institute, Universit\u00e9 de Namur, Belgium, September 1997."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Ilgun, K., \u201cUSTAT: A real-time intrusion detection system for Unix\u201d, in IEEE Symposium on Security and Privacy, pp. 16\u201329, 1993.","DOI":"10.1109\/RISP.1993.287646"},{"key":"13_CR12","series-title":"Ph. D. thesis","volume-title":"Classification and Detection of Computer Intrusion","author":"S. Kumar","year":"1995","unstructured":"Sandeep Kumar, Classification and Detection of Computer Intrusion, Ph. D. thesis, Department of Computer Science, Purdue University, West Lafayette, IN, USA, August 1995."},{"key":"13_CR13","unstructured":"Teresa Lunt, \u201cIDES: An intelligent system for detecting intruders\u201d, in Computer Security, Threats and Countermeasures, November 1990."},{"key":"13_CR14","unstructured":"Herv\u00e9 Debar, Marc Dacier and Andreas Wespi, A Revised Taxonomy for Intrusion-Detection Systems, Research Report RZ3176 (#93222), IBM Research, Zurich Research Laboratory, 23 p., October 25, 1999."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39945-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T20:03:41Z","timestamp":1736971421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39945-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410850","9783540399452"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-39945-3_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]},"assertion":[{"value":"11 November 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}