{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:11:44Z","timestamp":1742922704930,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642135767"},{"type":"electronic","value":"9783642135774"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13577-4_10","type":"book-chapter","created":{"date-parts":[[2010,6,18]],"date-time":"2010-06-18T09:37:04Z","timestamp":1276853824000},"page":"115-128","source":"Crossref","is-referenced-by-count":1,"title":["A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Bo","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Wo","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Wantao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Virtual security appliance, \n                      http:\/\/en.wikipedia.org\/wiki\/Virtual_security_appliance"},{"key":"10_CR2","unstructured":"Snort: An open-source network intrusion prevention and detection system by sourcefire, \n                      http:\/\/www.snort.org\/"},{"key":"10_CR3","unstructured":"Virtual Security Appliance Survey: What\u2019s Really Going On? \n                      http:\/\/www.idc.com\/getdoc.jsp?containerId=220767"},{"key":"10_CR4","unstructured":"Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (February 2003)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Joshi, A., King, S.T., Dunlap, G.W., Chen, P.M.: Detecting Past and Present Intrusions through Vulnerability-specific Predicates. In: Proceedings of the 2005 SOSP (October 2005)","DOI":"10.1145\/1095810.1095820"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Kourai, K., Chiba, S.: Hyperspector: Virtual distributed monitoring environments for secure intrusion detection. In: Proceedings of the 1st ACM\/USENIX International Conference on Virtual Execution Environments (2005)","DOI":"10.1145\/1064979.1065006"},{"issue":"23-24","key":"10_CR7","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks\u00a031(23-24), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"10_CR8","volume-title":"Proceedings of IEEE Symposium Security and Privacy","author":"C. Kruegel","year":"2002","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful Intrusion Detection for High-Speed Networks. In: Proceedings of IEEE Symposium Security and Privacy. IEEE Computer Society Press, Calif .(2002)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-36084-0_14","volume-title":"Recent Advances in Intrusion Detection","author":"W. Lee","year":"2002","unstructured":"Lee, W., Cabrera, J.B., Thomas, A., Balwalli, N., Saluja, S., Zhang, Y.: Performance Adaptation in Real-Time Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, p. 252. Springer, Heidelberg (2002)"},{"issue":"1-2","key":"10_CR10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-2002-101-202","volume":"10","author":"W. Lee","year":"2002","unstructured":"Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward Cost-sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security\u00a010(1-2), 5\u201322 (2002)","journal-title":"Journal of Computer Security"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-87403-4_8","volume-title":"Recent Advances in Intrusion Detection","author":"H. Dreger","year":"2008","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Predicting the resource consumption of network intrusion detection systems. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 135\u2013154. Springer, Heidelberg (2008)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10586-008-0060-0","volume":"11","author":"J. Xu","year":"2008","unstructured":"Xu, J., Zhao, M., Fortes, J., Carpenter, R., Yousif, M.: Autonomic resource management in virtualized data centers using fuzzy logic-based approaches. Cluster Comput. J.\u00a011, 213\u2013227 (2008)","journal-title":"Cluster Comput. J."},{"key":"10_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/9780470061176","volume-title":"Foundations of Fuzzy Control","author":"J. Jantzen","year":"2007","unstructured":"Jantzen, J.: Foundations of Fuzzy Control. John Wiley & Sons, Chichester (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13577-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T03:22:20Z","timestamp":1676690540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-13577-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642135767","9783642135774"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13577-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}