{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:34:03Z","timestamp":1773653643948,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642041167","type":"print"},{"value":"9783642041174","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_10","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"193-205","source":"Crossref","is-referenced-by-count":18,"title":["Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Bazara I. A.","family":"Barry","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H. Anthony","family":"Chan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Advances in Neural Information Processing Systems","volume-title":"Intrusion Detection with Neural Networks","author":"J. Ryan","year":"1998","unstructured":"J.\u00a0Ryan, M.\u00a0Lin, R.\u00a0Mikkulainen: Intrusion Detection with Neural Networks, Advances in Neural Information Processing Systems, Vol. 10 (MIT Press, Cambridge MA 1998)"},{"key":"10_CR2","unstructured":"A.\u00a0Ghosh, A.\u00a0Schwartzbard, M.\u00a0Shatz: Learning Program Behavior Profiles for Intrusion Detection, Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring (Santa Clara 1999)"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0167-9473(03)00177-4","volume":"45","author":"S.L. Scott","year":"2004","unstructured":"S.L.\u00a0Scott: A Bayesian paradigm for designing intrusion detection systems, Comput. Stat. Data Anal. 45(1), 69\u201383 (2004)","journal-title":"Comput. Stat. Data Anal."},{"key":"10_CR4","unstructured":"J.E.\u00a0Dickerson, J.\u00a0Juslin, O.\u00a0Koukousoula, J.A.\u00a0Dickerson: Fuzzy intrusion detection, Proc. IFSA World Congress and 20th NAFIPS International Conference (Vancouver 2001)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"R.\u00a0Sekar, Y.\u00a0Guang, S.\u00a0Verma, T.\u00a0Shanbhag: A\u00a0high-performance network intrusion detection system, Proc. 6th ACM Conference on Computer and Communication Security (Singapore 1999)","DOI":"10.1145\/319709.319712"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"R.\u00a0Sekar, A.\u00a0Gupta, J.\u00a0Frullo, T.\u00a0Shanbhag, A.\u00a0Tiwari, H.\u00a0Yang, S.\u00a0Zhou: Specification-based anomaly detection: A new approach for detecting network intrusions, ACM Computer and Communication Security Conference (CCS) (Washington DC 2002)","DOI":"10.1145\/586143.586146"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"K.\u00a0Ilgun, R.A.\u00a0Kemmerer, P.A.\u00a0Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Trans. Soft. Eng. 21(3), 181\u2013199 (1995)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10_CR8","unstructured":"A.\u00a0Pagnoni, A.\u00a0Visconti: An innate immune system for the protection of computer networks, Proc. 4th Int. Symposium on Information and Communication Technologies (Cape Town 2005)"},{"issue":"10","key":"10_CR9","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/32.544350","volume":"22","author":"N.J. Puketza","year":"1996","unstructured":"N.J.\u00a0Puketza, K.\u00a0Zhang, M.\u00a0Chung, B.\u00a0Mukherjee, R.A.\u00a0Olsson: A Methodology for Testing Intrusion Detection Systems, IEEE Trans. Softw. Eng. 22(10), 719\u2013729 (1996)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"P. Mell, V. Hu, R. Lipmann, J. Haines, M. Zissman: An Overview of Issues in Testing Intrusion Detection Systems, Technical Report NIST IR 7007 (National Institute of Standard and Technology 2003), available http:\/\/csrc.nist.gov","DOI":"10.6028\/NIST.IR.7007"},{"key":"10_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3458-4","volume-title":"Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint","author":"D.J. Marchette","year":"2001","unstructured":"D.J.\u00a0Marchette: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint (Springer, York, PA 2001), Chap. 3"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mahoney, P.\u00a0Chan: An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proc. 6th International Symposium, Recent Advances in Intrusion Detection (RAID\u201903) (Pittsburg 2003)","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"F.\u00a0Massicotte, F.\u00a0Gagnon, Y.\u00a0Labiche, L.\u00a0Briand, M.\u00a0Coutre: Automatic Evaluation of Intrusion Detection Systems, Proc. 22nd Annual Computer Security Applications Conference (ACSAC\u201906) (Miami Beach 2006)","DOI":"10.1109\/ACSAC.2006.15"},{"key":"10_CR14","first-page":"108","volume-title":"The Practical Intrusion Detection Handbook","author":"P.E. Proctor","year":"2001","unstructured":"P.E.\u00a0Proctor: The Practical Intrusion Detection Handbook (Prentice-Hall, Englewood Cliffs 2001) pp. 108\u2013111"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:19Z","timestamp":1606185559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_10","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}