{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:09:29Z","timestamp":1743156569674,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_56","type":"book-chapter","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T23:57:16Z","timestamp":1503359836000},"page":"785-798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantic Events"],"prefix":"10.1007","author":[{"given":"Susan Marie","family":"Thomas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2007, Edinburgh, pp. 575\u2013584 (2007)","DOI":"10.1109\/DSN.2007.103"},{"key":"56_CR2","unstructured":"List-Log-Format-2.0. \n                  http:\/\/help.sap.com\/saphelp_nw73ehp1\/helpdata\/en\/53\/82dae7c2f5439a8afd1b0ee95c2e45\/content.htm?frameset=\/en\/47\/e11b700b713c86e10000000a42189c\/frameset.htm"},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Kent, K., Souppaya, M.: Guide to Computer Security Log Management, NIST Special Publication 800-92, p. 5 (2006)","DOI":"10.6028\/NIST.SP.800-92"},{"issue":"2","key":"56_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1017\/S0269888900007797","volume":"11","author":"M Uschold","year":"1996","unstructured":"Uschold, M., Gruninger, M., et al.: Ontologies: principles, methods and applications. Knowl. Eng. Rev. 11(2), 93\u2013136 (1996)","journal-title":"Knowl. Eng. Rev."},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Bonial, C., Corvey, W., Palmer, M., Petukhova, V., Bunt, H.: A hierarchical unification of LIRICS and VerbNet semantic roles. In: Proceedings of the ICSC Workshop on Semantic Annotation for Computational Linguistic Resources (SACL-ICSC 2011), September 2011","DOI":"10.1109\/ICSC.2011.57"},{"key":"56_CR6","unstructured":"Prot\u00e9g\u00e9. \n                  http:\/\/protege.stanford.edu\/"},{"key":"56_CR7","volume-title":"Applying English Grammar","author":"E Tognini-Bonelli","year":"2004","unstructured":"Tognini-Bonelli, E.: Working with corpora: issues and insights. In: Coffin, C., et al. (eds.) Applying English Grammar. The Open University, Arnold (2004)"},{"issue":"1","key":"56_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1162\/COLI_a_00168","volume":"40","author":"T Kuhn","year":"2014","unstructured":"Kuhn, T.: A survey and classification of controlled natural languages. Comput. Linguist. 40(1), 121\u2013170 (2014)","journal-title":"Comput. Linguist."},{"key":"56_CR9","unstructured":"Palo Alto Networks: Common Event Format Configuration Guide, May (2014). \n                  https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/technical-documentation\/cef\/pan-os-60-CEF-guide.pdf"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., Meinel, C.: Hierarchical object log format for normalisation of security events. In: Information Assurance and Security (IAS 2013), pp. 25\u201330, December 2013","DOI":"10.1109\/ISIAS.2013.6947748"},{"key":"56_CR11","unstructured":"Feiertag, R., et al.: A Common Intrusion Specification Language (CISL). DARPA, 6 May 1999. \n                  http:\/\/gost.isi.edu\/cidf\/drafts\/language19990506.txt"},{"key":"56_CR12","unstructured":"The CEE Board: Common Event Expression. MITRE (2008). \n                  https:\/\/cee.mitre.org\/docs\/Common_Event_Expression_White_Paper_June_2008.pdf"},{"key":"56_CR13","unstructured":"McGuire, G., Reid, E.: The State of Security Automation Standards - 2011: A Survey. MITRE (2011). \n                  http:\/\/www.mitre.org\/sites\/default\/files\/pdf\/11_3822.pdf"},{"key":"56_CR14","unstructured":"DMTF: Cloud Audit Data Federation - OpenStack Profile: (CADF-OpenStack) A CADF Representation for OpenStack, version 1.1.0 (2015). \n                  http:\/\/www.dmtf.org\/sites\/default\/files\/standards\/documents\/DSP2038_1.1.0.pdf"},{"key":"56_CR15","unstructured":"IBM: IBM Qradar Security Intelligence Platform 7.2.5. \n                  http:\/\/www-01.ibm.com\/support\/knowledgecenter\/SS42VS_7.2.5\/com.ibm.qradar.doc_7.2.5\/c_qradar_adm_event_categories.html"},{"key":"56_CR16","unstructured":"Novell: Sentinel Event Schema. \n                  https:\/\/www.novell.com\/developer\/plugin-sdk\/event_schema.html"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T10:30:51Z","timestamp":1578479451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_56"}},"subtitle":["A New Linguistics-Inspired Way to Interpret and Represent Events"],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_56","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"23 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}