{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:45:52Z","timestamp":1725518752975},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_22","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"392-393","source":"Crossref","is-referenced-by-count":1,"title":["WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Nathalie","family":"Dagorn","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format. Internet Draft IETF (2005), \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-idwg-idmef-xml-14.txt"},{"key":"22_CR2","unstructured":"Julisch, K.: Using Root Cause Analysis to Handle Intrusion Detection Alarms. PhD Thesis, University of Dortmund, Germany (2003)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian Event Classification for Intrusion Detection. In: 19th Annual Computer Security Applications Conference. IEEE Computer Society Press, New York (2003)","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"22_CR4","volume-title":"Advances in Information Security","author":"C. Kruegel","year":"2005","unstructured":"Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation - Challenges and Solutions. In: Advances in Information Security, vol.\u00a014. Springer, Heidelberg (2005)"},{"issue":"5","key":"22_CR5","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C. Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A Multi-Model Approach to the Detection of Web-Based Attacks. Computer Networks\u00a048(5), 717\u2013738 (2005)","journal-title":"Computer Networks"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-39945-3_6","volume-title":"3rd International Symposium on Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2000","unstructured":"Valdes, A., Skinner, K.: Adaptive, Model-Based Monitoring for Cyber Attack Detection. In: 3rd International Symposium on Recent Advances in Intrusion Detection, pp. 80\u201392. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:40Z","timestamp":1619524660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}