{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:23:19Z","timestamp":1772846599016,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540232520","type":"print"},{"value":"9783540302322","type":"electronic"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30232-2_23","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T11:56:19Z","timestamp":1287921379000},"page":"359-376","source":"Crossref","is-referenced-by-count":27,"title":["A Temporal Logic Based Framework for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Prasad","family":"Naldurg","sequence":"first","affiliation":[]},{"given":"Koushik","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Prasanna","family":"Thati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA (May 1995)"},{"key":"23_CR2","unstructured":"Axelsson, S.: Intrusion detection systems: A taxonomy and survey. Technical Report 99\u201315, Dept. of Computer Engineering, Chalmers University of Technology, Sweden (2000)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Program monitoring with ltl in eagle. In: Workshop on Parallel and Distributed Systems: Testing and Debugging (PADTAD 2004) (Satellite workshop of IPDPS 2004), Santa Fe, New Mexico, USA (April 2004) (to appear)","DOI":"10.1109\/IPDPS.2004.1303336"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H. Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, pp. 44\u201357. Springer, Heidelberg (2004)"},{"key":"23_CR5","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: IEEE Computer Society Symposium on Research on Security and Privacy, May 1992, pp. 240\u2013250 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"issue":"8","key":"23_CR7","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H. Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Computer Networks\u00a031(8), 805\u2013822 (1999)","journal-title":"Computer Networks"},{"key":"23_CR8","series-title":"ENTCS","volume-title":"Proceedings of Runtime Verification (RV 2001)","author":"K. Havelund","year":"2001","unstructured":"Havelund, K., Ro\u015fu, G.: Monitoring Java Programs with Java PathExplorer. In: Proceedings of Runtime Verification (RV 2001). ENTCS, vol.\u00a055, Elsevier, Amsterdam (2001)"},{"key":"23_CR9","volume-title":"Introduction to Expert Systems-the Development and Implementation of Rule-Based Expert System","author":"J.P. Ignizio","year":"1991","unstructured":"Ignizio, J.P.: Introduction to Expert Systems-the Development and Implementation of Rule-Based Expert System. McGraw-Hill Science, New York (1991)"},{"issue":"3","key":"23_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R., Porras, P.: State transition analysis: A rulebased intrusion detection approach. IEEE Transactions on Software Engineering\u00a021(3), 181\u2013199 (1995)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Ko, C., Ruschitzka, M., Levitt, K.: Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In: IEEE Symposium on Security and Privacy, May 1997, pp. 175\u2013187 (1997)","DOI":"10.1109\/SECPRI.1997.601332"},{"key":"23_CR12","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection. In: National Computer Security Conference, pp. 11\u201321 (1994)"},{"key":"23_CR13","unstructured":"MIT Lincoln Laboratory. DARPA intrusion detection evaluation, \n                    \n                      http:\/\/www.ll.mit.edu\/IST\/ideval\/"},{"key":"23_CR14","unstructured":"Lee, W.: A datamining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, May 1999, pp. 120\u2013132 (1999)"},{"key":"23_CR15","unstructured":"Porras, P., Neumann, P.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: National Information Systems Security Conference (1997)"},{"key":"23_CR16","volume-title":"14th IEEE Computer Security Foundations Workshop (CSFW 2001)","author":"M. Roger","year":"2001","unstructured":"Roger, M., Goubault-Larrecq, J.: Log auditing through model-checking. In: 14th IEEE Computer Security Foundations Workshop (CSFW 2001), IEEE, Los Alamitos (2001)"},{"key":"23_CR17","unstructured":"Sebring, M., Shellhouse, E., Hanna, M., Whitehurst, R.: Expert systems in intrusion detection: A case study. In: National Computer Security Conference, pp. 74\u201381 (1998)"},{"key":"23_CR18","first-page":"337","volume-title":"9th European Software Engineering Conference and 11th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201903)","author":"K. Sen","year":"2003","unstructured":"Sen, K., Ro\u015fu, G., Agha, G.: Runtime Safety Analysis of Multithreaded Programs. In: 9th European Software Engineering Conference and 11th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201903), Helsinki, Finland, September 2003, pp. 337\u2013346. ACM, New York (2003)"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-24730-2_9","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K. Sen","year":"2004","unstructured":"Sen, K., Ro\u015fu, G., Agha, G.: Online efficient predictive safety analysis of multithreaded programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 123\u2013138. Springer, Heidelberg (2004)"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/ICSE.2004.1317464","volume-title":"Proceedings of 26th International Conference on Software Engineering (ICSE 2004)","author":"K. Sen","year":"2004","unstructured":"Sen, K., Vardhan, A., Agha, G., Ro\u015fu, G.: Efficient decentralized monitoring of safety in distributed systems. In: Proceedings of 26th International Conference on Software Engineering (ICSE 2004), Edinburgh, UK, May 2004, pp. 418\u2013427. IEEE, Los Alamitos (2004)"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/CAIA.1990.89167","volume-title":"Conference on Artificial Intelligence Applications","author":"H. Teng","year":"1990","unstructured":"Teng, H., Chen, K., Lu, S.: Security audit trail analysis using inductively generated predictive rules. In: Conference on Artificial Intelligence Applications, March 1990, pp. 24\u201329. IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924296"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems \u2013 FORTE 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30232-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T17:52:18Z","timestamp":1547747538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30232-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232520","9783540302322"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30232-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}