{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:07Z","timestamp":1725520627153},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_40","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"309-315","source":"Crossref","is-referenced-by-count":0,"title":["SLA and LAC: New Solutions for Security Monitoring in the Enterprise"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Giacometti","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/CSAC.2003.1254330","volume-title":"Proc. 19th Annual Computer Security Applications Conference","author":"C. Abad","year":"2003","unstructured":"Abad, C., Taylor, J., Sengul, C., Yurcik, W., Zhou, Y., Rowe, K.: Log correlation for intrusion detection: a proof of concept. In: Proc. 19th Annual Computer Security Applications Conference, pp. 255\u2013264. IEEE Press, New York (2003)"},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/SECPRI.2002.1004372","volume-title":"Proc. 2002 IEEE Symposium on Security and Privacy","author":"F. Cuppens","year":"2002","unstructured":"Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 202\u2013215. IEEE Press, New York (2002)"},{"key":"40_CR3","first-page":"85","volume-title":"Proc. 4th Int. Symp. Recent Advances in Intrusion Detection, RAID 2001","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. In: Proc. 4th Int. Symp. Recent Advances in Intrusion Detection, RAID 2001, pp. 85\u2013103. Springer, Berlin (2001)"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/11550907_143","volume-title":"Artificial Neural Networks: Formal Models and Their Applications \u2013 ICANN 2005","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., S\u00e1iz, J.M.: Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro\u017cny, S. (eds.) ICANN 2005. LNCS, vol.\u00a03697, pp. 905\u2013910. Springer, Heidelberg (2005)"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1007\/978-3-540-73007-1_138","volume-title":"Computational and Ambient Intelligence","author":"A. Herrero","year":"2007","unstructured":"Herrero, A., Corchado, E., Gastaldo, P., Zunino, R.: A comparison of neural projection techniques applied to Intrusion Detection Systems. In: Sandoval, F., Gonzalez Prieto, A., Cabestany, J., Gra\u00f1a, M. (eds.) IWANN 2007. LNCS, vol.\u00a04507, pp. 1138\u20131146. Springer, Heidelberg (2007)"},{"key":"40_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/72.554194","volume":"8","author":"S. Ridella","year":"1997","unstructured":"Ridella, S., Rovetta, S., Zunino, R.: Circular back-propagation networks for classification. IEEE Trans. on Neural Networks\u00a08, 84\u201397 (1997)","journal-title":"IEEE Trans. on Neural Networks"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T05:13:33Z","timestamp":1632028413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_40","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}