{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T12:02:25Z","timestamp":1748606545537},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037368"},{"type":"electronic","value":"9783642037375"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03737-5_28","type":"book-chapter","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T16:27:02Z","timestamp":1254155222000},"page":"389-403","source":"Crossref","is-referenced-by-count":19,"title":["Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns"],"prefix":"10.1007","author":[{"given":"Liberios","family":"Vokorokos","sequence":"first","affiliation":[]},{"given":"Anton","family":"Bal\u00e1\u017e","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Chovanec","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Vokorokos, L., Chovanec, M., L\u00e1tka, O.: Security of Distributed Intrusion Detection System Based on Multisensor Fusion. In: 6th International Symposium on Applied Machine Intelligence and Informatics SAMI, pp. 19\u201324 (2008) ISBN: 978-1-4244-2106-0","key":"28_CR1","DOI":"10.1109\/SAMI.2008.4469175"},{"unstructured":"Vokorokos, L., Chovanec, M.: Improvement of security protocols based on asymmetric key mechanism. In: ECI 2006, Her\u013eany - Slovakia (2006) ISBN 963 7154","key":"28_CR2"},{"unstructured":"Vokorokos, L.: Principles of Data Flow Controlled Computer Architectures, Copycenter Ko\u0161ice (2002) ISBN 80-7099-824-5","key":"28_CR3"},{"issue":"1","key":"28_CR4","first-page":"81","volume":"6","author":"L. Vokorokos","year":"2006","unstructured":"Vokorokos, L., Bal\u00e1\u017e, A., Chovanec, M.: Intrusion Detection System Using Self Organizing Map. Acta Electrotechnica et Informatica\u00a06(1), 81\u201386 (2006)","journal-title":"Acta Electrotechnica et Informatica"},{"issue":"3","key":"28_CR5","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"\u0160. Axelsson","year":"2000","unstructured":"Axelsson, \u0160.: The base-rate fallacy and the difficulty of intrusion detection. Information and System Security\u00a03(3), 186\u2013205 (2000)","journal-title":"Information and System Security"},{"issue":"4","key":"28_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"T. Bass","year":"2000","unstructured":"Bass, T.: Intrusion detection systems and multisensor data fusion. Communications of the ACM\u00a043(4), 99\u2013105 (2000)","journal-title":"Communications of the ACM"},{"unstructured":"Chovanec, M., L\u00e1tka, O.: Communication security of Sensors in Distributed Intrusion Detection Systems. In: 7th Scientific Conference TU Ko\u0161ice, Ko\u0161ice, Slovakia, 23.5, 2007 Elfa, s.r.o, I., 7 (2007) ISBN 978-80-8073-803-7","key":"28_CR7"},{"doi-asserted-by":"crossref","unstructured":"Bal\u00e1\u017e, A.: Architecture of the Intrusion Detection System Based on Partially Ordered Events and Patterns, Dissertation thesis, Ko\u0161ice (2008)","key":"28_CR8","DOI":"10.1109\/INES.2009.4924768"},{"doi-asserted-by":"crossref","unstructured":"Bace, R.G.: Intrusion Detection. Macmillan Publishing Co., Inc. (2000)","key":"28_CR9","DOI":"10.6028\/NIST.SP.800-31"},{"unstructured":"Zhouwei, L., Amitabha, D., Jianying, Z.: Theoretical Basis for Intrusion Detection (2005)","key":"28_CR10"},{"key":"28_CR11","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russel","year":"1995","unstructured":"Russel, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Inc., Englewood Cliffs (1995)"},{"unstructured":"Anderson, Lunt, Javits, Tamaru, Valdes: Detecting Unusual Program Behavior Using the Statistical Components of NIDES (1995)","key":"28_CR12"},{"unstructured":"Curry, D.A.: Improving the Security of your UNIX system (1990)","key":"28_CR13"},{"doi-asserted-by":"crossref","unstructured":"Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P.: Using artificial anomalies to detect unknown and known network intrusions, pp. 507\u2013527 (2004)","key":"28_CR14","DOI":"10.1007\/s10115-003-0132-7"},{"unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks (2002)","key":"28_CR15"}],"container-title":["Studies in Computational Intelligence","Towards Intelligent Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03737-5_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:35:27Z","timestamp":1606185327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03737-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037368","9783642037375"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03737-5_28","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2009]]}}}