{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:07:31Z","timestamp":1725538051759},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642043932"},{"type":"electronic","value":"9783642043949"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04394-9_11","type":"book-chapter","created":{"date-parts":[[2009,9,16]],"date-time":"2009-09-16T11:27:17Z","timestamp":1253100437000},"page":"82-91","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Computer Intrusions with Bayesian Networks"],"prefix":"10.1007","author":[{"given":"Wojciech","family":"Tylman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Snort Homepage, \n                    \n                      http:\/\/www.snort.org"},{"key":"11_CR2","volume-title":"Probabilistic Networks and Expert Systems","author":"R. Cowell","year":"1999","unstructured":"Cowell, R., Dawid, P., Lauritzen, S., Spiegelhalter, D.: Probabilistic Networks and Expert Systems. Springer, New York (1999)"},{"key":"11_CR3","volume-title":"Learning Bayesian Networks","author":"R. Neapolitan","year":"2004","unstructured":"Neapolitan, R.: Learning Bayesian Networks. Pearson Prentice Hall, Upper Saddle River (2004)"},{"key":"11_CR4","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers, San Mateo (1988)"},{"key":"11_CR5","first-page":"203","volume-title":"Proceedings of 3rd International Conference on Dependability of Computer Systems","author":"W. Tylman","year":"2008","unstructured":"Tylman, W.: Misuse-Based Intrusion Detection Using Bayesian Networks. In: Proceedings of 3rd International Conference on Dependability of Computer Systems, pp. 203\u2013210. IEEE Computer Society, Los Alamitos (2008)"},{"key":"11_CR6","unstructured":"Metasploit Framework Homepage, \n                    \n                      http:\/\/www.metasploit.org"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","volume-title":"Recent Advances in Intrusion Detection","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 220\u2013237. Springer, Heidelberg (2003)"},{"key":"11_CR8","unstructured":"Brugger, S.T., Chow, J.: An Assessment of the DARPA IDS Evaluation Dataset Using Snort. Technical Report, UC Davis (2007)"},{"key":"11_CR9","unstructured":"Bugtraq Webpage for the WebViewFolderIcon ActiveX Buffer Overflow Vulnerability, \n                    \n                      http:\/\/www.securityfocus.com\/bid\/19030"},{"key":"11_CR10","first-page":"66","volume-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics","author":"F. Jemili","year":"2007","unstructured":"Jemili, F., Zaghdoud, M., Ben Ahmed, M.: A Framework for an Adaptive Intrusion Detection System Using Bayesian Network. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 66\u201370. IEEE, Piscataway (2007)"},{"key":"11_CR11","first-page":"3881","volume-title":"Proceedings of the 7th World Congress on Intelligent Control and Automation","author":"T. Liu","year":"2007","unstructured":"Liu, T., Qi, A., Hou, Y., Chang, X.: Method for Network Anomaly Detection Based on Bayesian Statistical Model with Time Slicing. In: Proceedings of the 7th World Congress on Intelligent Control and Automation, pp. 3881\u20133885. IEEE, Piscataway (2007)"},{"key":"11_CR12","first-page":"365","volume-title":"Proceedings of the 18th International Workshop on Database and Expert Systems Applications","author":"P.G. Bringas","year":"2007","unstructured":"Bringas, P.G.: Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems. In: Proceedings of the 18th International Workshop on Database and Expert Systems Applications, pp. 365\u2013371. IEEE Computer Society, Los Alamitos (2007)"},{"key":"11_CR13","first-page":"463","volume-title":"Proceedings of the Second Asia International Conference on Modelling and Simulation","author":"K.C. Khor","year":"2008","unstructured":"Khor, K.C., Ting, C.Y., Phon-Amnuaisuk, S.: A Probabilistic Approach for Network Intrusion Detection. In: Proceedings of the Second Asia International Conference on Modelling and Simulation, pp. 463\u2013468. IEEE Press, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning - IDEAL 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04394-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T22:40:06Z","timestamp":1552171206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04394-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043932","9783642043949"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04394-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}