{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:58:32Z","timestamp":1725487112856},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729853"},{"type":"electronic","value":"9783540729860"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72986-0_24","type":"book-chapter","created":{"date-parts":[[2007,7,6]],"date-time":"2007-07-06T00:54:10Z","timestamp":1183683250000},"page":"196-199","source":"Crossref","is-referenced-by-count":1,"title":["A Survey of the High-Speed Self-learning Intrusion Detection Research Area"],"prefix":"10.1007","author":[{"given":"Anna","family":"Sperotto","sequence":"first","affiliation":[]},{"given":"Remco","family":"van de Meent","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","first-page":"2","volume-title":"(CSS\u201904)","author":"H. Dreger","year":"2004","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational experiences with high-volume network intrusion detection. In (CSS\u201904). SIGSAC: 11th ACM Conference on Computer and Communications Security, pp. 2\u201311. ACM Press, New York (2004)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Autonomic Communication","author":"F. Dressler","year":"2005","unstructured":"Dressler, F., M\u00fcnz, G., Carle, G.: CATS - cooperating autonomous detection systems. In: Smirnov, M. (ed.) WAC 2004. LNCS, vol.\u00a03457, Springer, Heidelberg (2005)"},{"key":"24_CR3","first-page":"166","volume-title":"(WETICE\u201905)","author":"T. D\u00fcbendorfer","year":"2005","unstructured":"D\u00fcbendorfer, T., Plattner, B.: Host behaviour based early detection of worm outbreaks in internet backbones. In (WETICE\u201905). Enabling Technologies: Infrastructure for Collaborative Enterprise, 14th IEEE International Workshops on, pp. 166\u2013171. IEEE Computer Society Press, Los Alamitos (2005)"},{"unstructured":"D\u00fcbendorfer, T., Wagner, A., Plattner, B.: A framework for real-time worm attack detection and backbone monitoring. In: Critical Infrastructure Protection, First IEEE International Workshop on (IWCIP\u201905) (November 2005)","key":"24_CR4"},{"key":"24_CR5","first-page":"249","volume-title":"(AINA\u201906)","author":"M. Gao","year":"2006","unstructured":"Gao, M., Zhang, K., Lu, J.: Efficient packet matching for gigabit network intrusion detection using TCAMs. In (AINA\u201906). Advanced Information Networking and Applications, 20th International Conferece, pp. 249\u2013254. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"24_CR6","first-page":"39","volume-title":"ICDCS 2006","author":"Y. Gao","year":"2006","unstructured":"Gao, Y., Li, Z., Chen, Y.: A DoS resilient flow-level intrusion detection approach for high-speed networks. In: ICDCS 2006. Distributed Computing Systems, 26th IEEE International Conference, pp. 39\u201346. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"24_CR7","volume-title":"Intrusion Detection and Correlation: Challenges and Solutions","author":"C. Kruegel","year":"2004","unstructured":"Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation: Challenges and Solutions. Springer, Heidelberg (2004)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-540-24852-1_32","volume-title":"Applied Cryptography and Network Security","author":"H. Lai","year":"2004","unstructured":"Lai, H., Cai, S., Huang, H., Xie, J., Li, H.: A parallel intrusion detection system for high-speed networks. In: ACNS 2004. LNCS, vol.\u00a03089, pp. 439\u2013451. Springer, Heidelberg (2004)"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"1840","DOI":"10.1109\/JSAC.2006.877139","volume":"24","author":"Q. Zhao","year":"2006","unstructured":"Zhao, Q., Xu, J., Kumar, A.: Detection of super sources and destinations in high-speed networks: Algorithms, analysis and evaluation. Selected Areas in Communications, IEEE Journal\u00a024, 1840\u20131852 (2006)","journal-title":"Selected Areas in Communications, IEEE Journal"}],"container-title":["Lecture Notes in Computer Science","Inter-Domain Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72986-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T05:45:16Z","timestamp":1539323116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72986-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540729853","9783540729860"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72986-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}