{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:40:51Z","timestamp":1742920851426,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922940"},{"type":"electronic","value":"9783540922957"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92295-7_21","type":"book-chapter","created":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T08:00:00Z","timestamp":1237968000000},"page":"175-180","source":"Crossref","is-referenced-by-count":1,"title":["A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms"],"prefix":"10.1007","author":[{"given":"Subramanian","family":"Neelakantan","sequence":"first","affiliation":[]},{"given":"Shrisha","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-36084-0_7","volume-title":"Recent Advances in Intrusion Detection","author":"B. Morin","year":"2002","unstructured":"Morin, B., Me, L., Debar, H., Ducasse, M.: M2d2: A formal data model for ids alert correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 115\u2013137. Springer, Heidelberg (2002)"},{"unstructured":"Gula, R.: Correlating ids alerts with vulnerability information. Tenable Network Security, Technical Report (2007)","key":"21_CR2"},{"doi-asserted-by":"crossref","unstructured":"Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing, 146\u2013169 (2004)","key":"21_CR3","DOI":"10.1109\/TDSC.2004.21"},{"unstructured":"Axelsson, S.: Research in intrusion-detection systems: A survey. Technical Report 98\u201317, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden (1998)","key":"21_CR4"},{"doi-asserted-by":"crossref","unstructured":"Kruegel, C., Robertson, W.: Alert verification: Determining the success of intrusion attempts. In: Proceedings of DIMVA 2004 (2004)","key":"21_CR5","DOI":"10.1515\/PIKO.2004.219"},{"unstructured":"Desai, N.: IDS Correlation of VA data and IDS Alerts. Security Focus (2003)","key":"21_CR6"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92295-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T16:02:35Z","timestamp":1684944155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92295-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922940","9783540922957"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92295-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}