{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:12:04Z","timestamp":1725538324850},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_13","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"101-108","source":"Crossref","is-referenced-by-count":6,"title":["A Multi-objective Optimisation Approach to IDS Sensor Placement"],"prefix":"10.1007","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[]},{"given":"John A.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Juan E.","family":"Tapiador","sequence":"additional","affiliation":[]},{"given":"Siraj A.","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Howard","family":"Chivers","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Nobles","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co., Inc., Boston (1989)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/358923.358929","volume":"32","author":"C.A.C. Coello","year":"1998","unstructured":"Coello, C.A.C., Nacional, L.: An updated survey of ga-based multiobjective optimization techniques. ACM Computing Surveys\u00a032, 109\u2013143 (1998)","journal-title":"ACM Computing Surveys"},{"key":"13_CR3","unstructured":"Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In: Proceedings of the 2003 Congress on Evolutionary Computation (2003)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Attack graphs for sensor placement, alert prioritization, and attack response. In: Cyberspace Research Workshop (2007)","DOI":"10.1007\/s10922-008-9109-x"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1137627.1137638","volume-title":"SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems","author":"M. Rolando","year":"2006","unstructured":"Rolando, M., Rossi, M., Sanarico, N., Mandrioli, D.: A formal approach to sensor placement and configuration in a network intrusion detection system. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 65\u201371. ACM, New York (2006)"},{"key":"13_CR6","volume-title":"An Introduction to Network Simulator Ns2","author":"T. Issariyakul","year":"2008","unstructured":"Issariyakul, T., Hossain, E.: An Introduction to Network Simulator Ns2. Springer, Heidelberg (2008)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1353-4858(08)70129-6","volume":"11","author":"S.A. Shaikh","year":"2008","unstructured":"Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A., Chen, H.: Network reconnaissance. Network Security\u00a011, 12\u201316 (2008)","journal-title":"Network Security"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/1128817.1128834","volume-title":"ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security","author":"G. Gu","year":"2006","unstructured":"Gu, G., Fogla, P., Dagon, D., Lee, W., Skoric, B.: Measuring intrusion detection capability: an information-theoretic approach. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 90\u2013101. ACM, New York (2006)"},{"key":"13_CR9","unstructured":"Luke, S.: A java-based evolutionary computation research system (2008), http:\/\/cs.gmu.edu\/~eclab\/projects\/ecj\/"},{"key":"13_CR10","unstructured":"Zitzler, E., Laumanns, M., Thiele, L.: Spea2: Improving the strength pareto evolutionary algorithm. Technical Report 103, Swiss Federal Institute of Technology (2001)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-642-02617-1_26","volume-title":"3rd International Conference on Information Security and Assurance","author":"S.A. Shaikh","year":"2009","unstructured":"Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A., Chen, H.: A deployment value model for intrusion detection sensors. In: 3rd International Conference on Information Security and Assurance. LNCS, vol.\u00a05576, pp. 250\u2013259. Springer, Heidelberg (2009)"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T22:39:22Z","timestamp":1685140762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_13","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}