{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:03Z","timestamp":1725518763587},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_25","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"398-399","source":"Crossref","is-referenced-by-count":1,"title":["Improving Anomaly Detection Error Rate by Collective Trust Modeling"],"prefix":"10.1007","author":[{"given":"Martin","family":"Reh\u00e1k","sequence":"first","affiliation":[]},{"given":"Michal","family":"P\u011bchou\u010dek","sequence":"additional","affiliation":[]},{"given":"Karel","family":"Barto\u0161","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Grill","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"\u010celeda","sequence":"additional","affiliation":[]},{"given":"Vojt\u011bch","family":"Krm\u00ed\u010dek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-75119-9_21","volume-title":"Cooperative Information Agents XI","author":"M. Rehak","year":"2007","unstructured":"Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), vol.\u00a04676, pp. 298\u2013312. Springer, Heidelberg (2007)"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TDSC.2004.21","volume":"01","author":"F. Valeur","year":"2004","unstructured":"Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing\u00a001, 146\u2013169 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.inffus.2006.10.002","volume":"9","author":"G. Giacinto","year":"2008","unstructured":"Giacinto, G., Perdisci, R., Rio, M.D., Roli, F.: Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Information Fusion\u00a09, 69\u201382 (2008)","journal-title":"Information Fusion"},{"key":"25_CR4","series-title":"LNCS(LNAI)","volume-title":"Cooperative Information Agents XII","author":"M. Rehak","year":"2008","unstructured":"Rehak, M., Pechoucek, M., Grill, M., Bartos, K.: Trust-based classifier combination for network anomaly detection. In: Cooperative Information Agents XII. LNCS(LNAI), Springer, Heidelberg (to appear, 2008)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:40Z","timestamp":1619524660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}