{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:22Z","timestamp":1742913322521,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233886"},{"type":"electronic","value":"9783540301417"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30141-7_59","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T21:57:27Z","timestamp":1284847047000},"page":"419-426","source":"Crossref","is-referenced-by-count":4,"title":["Ontology Based Cooperative Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Yanxiang","family":"He","sequence":"first","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion Detection Model. IEEE Transactions on Software Engineering\u00a0SE-13, 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"59_CR2","unstructured":"Axelsson, S.: Intrusion Detection Systems: A survey and Taxonomy. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden (March 2000)"},{"key":"59_CR3","unstructured":"Snapp, S.R., Smaha, S.E., Teal, D.M., Grance, T.: The DIDS (distributed intrusion detection system) prototype. In: Proceedings of the Summer USENIX Conference, San Antonio, Texas, June 8-12, pp. 227\u2013233 (1992)"},{"key":"59_CR4","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, Baltimore, Maryland, USA, October 7-10, pp. 353\u2013365 (1997)"},{"key":"59_CR5","unstructured":"Ning, P.: Correlating Alerts Using Prerequisites of Intrusions. Department of Computer Science, NC State University, \n                    \n                      http:\/\/www.mts.jhu.edu\/marchette\/ID04\/Papers\/CorrelationModel.pdf"},{"key":"59_CR6","unstructured":"Frincke, D., Tobin, D., et al.: A Framework for Cooperative Intrusion Detection. In: Proceedings of the 21 st National Information Systems Security Conference, October 1998, pp. 361\u2013373 (1998)"},{"key":"59_CR7","unstructured":"Pinkston, J., Undercoffer, J., et al.: A Target-Centric Ontology for Intrusion Detection. University of Maryland, Baltimore County Department of Computer Science and Electrical Engineering"},{"key":"59_CR8","unstructured":"CVE, Common Vulnerabilities and Exposures, \n                    \n                      http:\/\/www.cve.mitre.org\/"},{"key":"59_CR9","unstructured":"Snort. Open Source Network Intrusion Detection System, \n                    \n                      http:\/\/www.snort.org"},{"key":"59_CR10","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: 13th Administration Conference, LISA 1999, Seattle, WA (November 1999)"},{"key":"59_CR11","volume-title":"The Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"W. Lee","year":"1999","unstructured":"Lee, W., Stolfo, S.J., Mok, K.: A data mining framework for adaptive intrusion detection. In: The Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"59_CR12","unstructured":"Strace for NT, \n                    \n                      http:\/\/razor.bindview.com\/tools\/desc\/strace"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30141-7_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T19:24:51Z","timestamp":1553109891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30141-7_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233886","9783540301417"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30141-7_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}