{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:38Z","timestamp":1743011858575,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540921561"},{"type":"electronic","value":"9783540921578"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92157-8_20","type":"book-chapter","created":{"date-parts":[[2008,11,29]],"date-time":"2008-11-29T02:54:09Z","timestamp":1227927249000},"page":"230-241","source":"Crossref","is-referenced-by-count":4,"title":["A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks"],"prefix":"10.1007","author":[{"given":"Salvatore","family":"D\u2019Antonio","sequence":"first","affiliation":[]},{"given":"Simon Pietro","family":"Romano","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Simpson","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"The INTERSECTION Project, http:\/\/www.intersection-project.eu\/"},{"key":"20_CR2","unstructured":"Abad, C., Li, Y., Lakkaraju, K., Yin, X., Yurcik, W.: Correlation between netflow system and network views for intrusion detection"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Abad, C., Taylor, J., Sengul, C., Yurcik, W., Zhou, Y., Rowe, K.: Log correlation for intrusion detection: A proof of concept. In: Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC (2003)","DOI":"10.1109\/CSAC.2003.1254330"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Armannsson, D., Smith, P., Hjalmtysson, G., Mathy, L.: Controlling the Effects of Anomalous ARP Behaviour on Ethernet Networks. In: CoNEXT 2005, Toulouse, France, October 2005, pp. 50\u201360 (2005)","DOI":"10.1145\/1095921.1095929"},{"key":"20_CR5","volume-title":"Intrusion Detection","author":"R.G. Bace","year":"2000","unstructured":"Bace, R.G.: Intrusion Detection. Macmillan Technical Publishing, Basingstoke (2000)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Baker, A.R., Caswell, B., Poor, M.: Snort 2.1 Intrusion Detection, 2nd edn. Syngress (2004)","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_8","volume-title":"Recent Advances in Intrusion Detection","author":"I. Balepin","year":"2003","unstructured":"Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820. Springer, Heidelberg (2003)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). Number 4765 in RFC. IETF (March 2007)","DOI":"10.17487\/rfc4765"},{"key":"20_CR9","unstructured":"Gamer, T., Sch\u00f6ller, M., Bless, R.: A granularity-adaptive system for in-network attack detection. In: IEEE \/ IST Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen, Germany, pp. 47\u201350 (September 2006)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of ACM SIGCOMM 2005 (August 2005)","DOI":"10.1145\/1080091.1080118"},{"key":"20_CR11","unstructured":"Li, Z., Taylor, J., Partridge, E., Zhou, Y., Yurcik, W., Abad, C., Barlow, J.J., Rosendale, J.: Uclog: A unified, correlated logging architecture for intrusion detection. In: Proceedings of the 12th International Conference on Telecommunication Systems - Modeling and Analysis, ICTSM (2004)"},{"key":"20_CR12","first-page":"146","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"U. Lindqvist","year":"1999","unstructured":"Lindqvist, U., Porras, P.A.: Detecting computer and network misuse through the production-based expert system toolset (p-best). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 1999, pp. 146\u2013161. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: Proceedings of ACM SAC 2003 (2003)","DOI":"10.1145\/952532.952601"},{"key":"20_CR14","unstructured":"Paxson, V., Terney, B.: Bro reference manual (2004)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Xie, L., Smith, P., Jabbar, A., Banfield, M., Leopold, H., Hutchison, D., Sterbenz, J.P.G.: From Detection to Remediation: A Self-Organized System for Addressing Flash Crowd Problems. In: IEEE International Conference on Communications (ICC 2008), Beijing, China (May 2008)","DOI":"10.1109\/ICC.2008.1087"},{"key":"20_CR16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1029208.1029214","volume-title":"Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security","author":"X. Yin","year":"2004","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pp. 26\u201334. ACM Press, New York (2004)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Luo, J., Lu, H. (eds.): Wireless Mesh Networking Architecture, Protocols and Standards. Auerbach Publications (2007)","DOI":"10.1201\/9781420013542"}],"container-title":["Lecture Notes in Computer Science","Self-Organizing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92157-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T14:02:34Z","timestamp":1632492154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92157-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540921561","9783540921578"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92157-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}