{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:48Z","timestamp":1725566208478},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_14","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"158-169","source":"Crossref","is-referenced-by-count":14,"title":["A Model for the Semantics of Attack Signatures in Misuse Detection Systems"],"prefix":"10.1007","author":[{"given":"Michael","family":"Meier","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Eckmann, St. T.; Vigna, G.; Kemmerer, R. A.: STATL: an Attack Language for Statebased Intrusion Detection. In: Proc. of the ACM Workshop on Intrusion Detection, Athens, Greece (November 2000)"},{"key":"14_CR2","volume-title":"Conference on Information Security","author":"C. Michel","year":"2001","unstructured":"Michel, C., Me, L.: ADeLe: an Attack Description Language for Knowledge-based Intrusion Detection, in Proc. of the Internat. In: Conference on Information Security, June 2001, Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"F. Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: LAMBDA: A Language to Model a Database for Detection of Attacks. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 197\u2013216. Springer, Heidelberg (2000)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45474-8_1","volume-title":"Recent Advances in Intrusion Detection","author":"J.-P. Pouzol","year":"2001","unstructured":"Pouzol, J.-P., Ducass\u00e9, M.: From Declarative Signatures to Misuse IDS. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 1\u201321. Springer, Heidelberg (2001)"},{"key":"14_CR5","first-page":"559","volume-title":"Proc. of the 17th International Conference on Information Security","author":"M. Meier","year":"2002","unstructured":"Meier, M., Bischof, N., Holz, T.: SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures. In: Proc. of the 17th International Conference on Information Security, pp. 559\u2013571. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"14_CR6","unstructured":"Zimmer, D.: A Meta-Model for the Definition of the Semantics of Complex Events in Active Database Management Systems (in German). PhD Thesis, University of Paderborn, Shaker-Verlag, ISBN: 3-8265-3744-0 (1998)"},{"key":"14_CR7","first-page":"392","volume-title":"Proc. of the 15th International Conference on Data Engineering","author":"D. Zimmer","year":"1999","unstructured":"Zimmer, D., Unland, R.: On the Semantics of Complex Events in Active Database Management Systems. In: Proc. of the 15th International Conference on Data Engineering, pp. 392\u2013399. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"14_CR8","unstructured":"Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages, in: Proc. of the IEEE Information Survivability Workshop, Boston, MA (October 2000)"},{"key":"14_CR9","unstructured":"Kumar, S.: Classification and Detection of Computer Intrusions, PhD Thesis, Purdue University (1995)"},{"key":"14_CR10","first-page":"1","volume-title":"Active Database Systems","author":"U. Dayal","year":"1996","unstructured":"Dayal, U., Buchmann, A., Chakravarthy, S.: The HiPAC Project. In: Active Database Systems, pp. 1\u201355860. Morgan Kaufmann, San Francisco (1996) ISBN: 1-55860-304-2"},{"key":"14_CR11","unstructured":"Chakravarthy, S., Krishnaprasad, V., Anwar, E., Kim, S.: Composite Events for Active Databases: Semantics, Contexts and Detection. In: Proc. of the 20th International Conference on Very Large Databases, pp. 606\u2013617 (1994)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Collet, C., Coupaye, T.: Composite Events in NAOS. In: Proc. of the seventh International Conference on Database and Expert Systems Applications, pp. 475\u2013481 (1996)","DOI":"10.1007\/BFb0034685"},{"key":"14_CR13","unstructured":"Berndtsson, M.: ACCOD: An approach to an Active Object-Oriented DBMS. Master thesis, University of Sk\u00f6vde (1991)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:25Z","timestamp":1620013945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}