{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:37:41Z","timestamp":1725489461485},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540730651"},{"type":"electronic","value":"9783540730668"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73066-8_19","type":"book-chapter","created":{"date-parts":[[2007,8,18]],"date-time":"2007-08-18T08:07:13Z","timestamp":1187424433000},"page":"276-291","source":"Crossref","is-referenced-by-count":2,"title":["Towards Systematic Signature Testing"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Schmerl","sequence":"first","affiliation":[]},{"given":"Hartmut","family":"Koenig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/DISCEX.2003.1194892","volume-title":"Proc. of the 3rd DARPA Information Survivability Conf. and Exposition","author":"S. Cheung","year":"2003","unstructured":"Cheung, S., Lindqvist, U., Fong, M.: Modeling Multistep Cyber Attacks for Scenario Recognition. In: Proc. of the 3rd DARPA Information Survivability Conf. and Exposition, pp. 284\u2013292. IEEE Computer Society Press, Washington (2003)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-36084-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"H. Debar","year":"2002","unstructured":"Debar, H., Morin, B.: Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 177\u2013198. Springer, Heidelberg (2002)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"K. Julisch","year":"2000","unstructured":"Julisch, K.: Dealing with False Positives in Intrusion Detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, Springer, Heidelberg (2000)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/11506881_6","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"U. Larson","year":"2005","unstructured":"Larson, U., Lundin Barse, E., Jonsson, E.: METAL - A Tool for Extracting Attack Manifestations. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 85\u2013102. Springer, Heidelberg (2005)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-39945-3_11","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARAP Off-Line Intrusion Detection System Evaluation. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 162\u2013182. Springer, Heidelberg (2000)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-36084-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2002","unstructured":"Lippmann, R., Webster, S., Stetson, D.: The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 307\u2013326. Springer, Heidelberg (2002)"},{"key":"19_CR7","first-page":"559","volume-title":"Proc. of the 17th IFIP International Conference on Information Security","author":"M. Meier","year":"2002","unstructured":"Meier, M., Bischof, N., Holz, T.: SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures. In: Proc. of the 17th IFIP International Conference on Information Security, pp. 559\u2013571. Kluwer, Dordrecht (2002)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/11506881_12","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"M. Meier","year":"2005","unstructured":"Meier, M., Schmerl, S., Koenig, H.: Improving the Efficiency of Misuse Detection. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 188\u2013205. Springer, Heidelberg (2005)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"M.J. Ranum","year":"2002","unstructured":"Ranum, M.J.: Challenges for the Future of Intrusion Detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, Springer, Heidelberg (2002)"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/CSAC.2004.9","volume-title":"Proc. of. 20th Annual Computer Security Applications Conference","author":"S. Rubin","year":"2004","unstructured":"Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proc. of. 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, pp. 28\u201338. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"19_CR11","first-page":"3","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"S. Rubin","year":"2005","unstructured":"Rubin, S., Jha, S., Miller, P.B.: Language-based generation and evaluation of NIDS signatures. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 3\u201317. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11766155_31","volume-title":"Emerging Trends in Information and Communication Security","author":"S. Schmerl","year":"2006","unstructured":"Schmerl, S., K\u00f6nig, H., Flegel, U., Meier, M.: Simplifying Signature Engineering by Reuse. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 436\u2013450. Springer, Heidelberg (2006)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11663812_3","volume-title":"Recent Advances in Intrusion Detection","author":"E. Totel","year":"2006","unstructured":"Totel, E., Majorczyk, F., M\u00e9, L.: COTS Diversity Based Intrusion Detection and Application to Web Servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 43\u201362. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Testing of Software and Communicating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73066-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:50:04Z","timestamp":1550796604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73066-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540730651","9783540730668"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73066-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}