{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T05:04:14Z","timestamp":1740287054026,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206934"},{"type":"electronic","value":"9783540409816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40981-6_16","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:17:45Z","timestamp":1277234265000},"page":"191-204","source":"Crossref","is-referenced-by-count":2,"title":["Formal Specification for Fast Automatic IDS Training"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Durante","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"16_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/504909.504911","volume":"5","author":"M. Bernaschi","year":"2002","unstructured":"Bernaschi, M., Gabrielli, E., Mancini, L.V.: Remus: a security-enhanced operating system. ACM Transactions on Information and System Security (TISSEC)\u00a05(1), 36\u201361 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"16_CR2","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defences for the vulnerability of the decade. In: Proceedings IEEE DARPA Information Survivability Conference and Expo (January 2000)"},{"issue":"4","key":"16_CR3","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1145\/363516.363532","volume":"9","author":"A. Durante","year":"2000","unstructured":"Durante, A., Focardi, R., Gorrieri, R.: A compiler for analyzing cryptographic protocols using noninterference. ACM Transactions on Software Engineering and Methodology (TOSEM)\u00a09(4), 488\u2013528 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/3-540-45116-1_28","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"A. Durante","year":"2001","unstructured":"Durante, A., Focardi, R., Gorrieri, R.: CVS at work: A report on new failures upon some cryptographic protocols. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 287\u2013299. Springer, Heidelberg (2001)"},{"issue":"9","key":"16_CR5","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. Software Engineering\u00a023(9), 550\u2013571 (1997)","journal-title":"Software Engineering"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Fraser, T., Badger, L., Feldman, M.: Hardening COTS software with generic software wrappers. In: IEEE Symposium on Security and Privacy, pp. 2\u201316 (1999)","DOI":"10.1109\/SECPRI.1999.766713"},{"key":"16_CR7","unstructured":"Ghormley, D.P., Petrou, D., Rodrigues, S.H., Anderson, T.E.: SLIC: An extensibility system for commodity operating systems. In: Proceedings of the USENIX 1998 Annual Technical Conference, Berkeley, USA, June 15\u201319, pp. 39\u201352. USENIX Association (1998)"},{"key":"16_CR8","unstructured":"Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51\u201362 (April 1999)"},{"issue":"3","key":"16_CR9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S.A. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security\u00a06(3), 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"16_CR10","unstructured":"IETF Internet Draft, http:\/\/www.ietf.org\/rfc.html"},{"key":"16_CR11","unstructured":"http:\/\/www.faqs.org\/rfcs\/rfc1939.html"},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering\u00a021(3), 181\u2013199 (1995)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"16_CR13","first-page":"190","volume-title":"PCSFW: Proceedings of The 11th Computer Security Foundations Workshop","author":"S. Jajodia","year":"1998","unstructured":"Jajodia, S., Lin, J.L., Wang, X.S.: Abstraction-based misuse detection: High-level specifications and adaptable strategies. In: PCSFW: Proceedings of The 11th Computer Security Foundations Workshop, pp. 190\u2013201. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"16_CR14","volume-title":"Proceedings DARPA Information Survivability Conference and Exposition (DISCEX)","author":"R.P. Lippmann","year":"2000","unstructured":"Lippmann, R.P.: Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition (DISCEX). IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"16_CR15","volume-title":"Communication and concurrency","author":"R. Milner","year":"1989","unstructured":"Milner, R.: Communication and concurrency. Prentice Hall, New York (1989)"},{"key":"16_CR16","unstructured":"Security Enhanced Linux, http:\/\/www.nsa.gov\/selinux"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automation-based method for detecting anomalous program behavior. In: IEEE Symposium on Security and Privacy, Oackland CA, pp. 144\u2013155 (May 2001)","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"16_CR18","unstructured":"Sekar, R., Uppuluri, P.: Synthesizing fast intrusion prevention\/detection systems from high-level specifications. In: Proceedings of the 8th USENIX Security Symposium, Washington DC, USA, pp. 63\u201378 (August 1999)"},{"key":"16_CR19","unstructured":"Szyperski, C., Gruntz, D., Murer, S.: Component software: Beyond object-oriented programming. Addison-Wesley \/ ACM Press (2002)"},{"key":"16_CR20","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of the ACM CSS Workshop on Data Mining for Security Applications, November 8 (2001)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy, Oackland CA, pp. 156\u2013169 (2001)","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry Attacks on Host-Based Intrusion Detection Systems. In: Ninth ACM Conference on Computer and Communications Security, Washington, DC, USA, November 18-22 (2002)","DOI":"10.1145\/586110.586145"},{"key":"16_CR23","unstructured":"Walker, K.M., Sterne, D.F., Badger, M.L., Petkac, M.J., Shermann, D.L., Oostendorp, K.: Confining root programs with domain and type enforcement (DTE). In: Proceeding of the 6th USENIX UNIX Security Symposium, San Jose, California, USA (July 1996)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40981-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T04:49:49Z","timestamp":1740199789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40981-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206934","9783540409816"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40981-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}