{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:14:31Z","timestamp":1742098471037,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_4","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:37:08Z","timestamp":1323441428000},"page":"9-18","source":"Crossref","is-referenced-by-count":8,"title":["Scalable Detection of Cyber Attacks"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"V. S.","family":"Subrahmanian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Albanese, M., Pugliese, A., Subrahmanian, V.S., Udrea, O.: MAGIC: A multi-activity graph index for activity detection. In: Proc. of the IEEE Intl. Conference on Information Reuse and Integration (IRI 2007), pp. 267\u2013272 (August 2007)","DOI":"10.1109\/IRI.2007.4296632"},{"key":"4_CR2","unstructured":"Avrahami-Zilberbrand, D., Kaminka, G., Zarosim, H.: Fast and Complete Symbolic Plan Recognition: Allowing for Duration, Interleaved Execution, and Lossy Observations. In: Proc. of the AAAI Workshop on Modeling Others from Observations, MOO-2005 (2005)"},{"key":"4_CR3","unstructured":"Dain, O., Cunningham, R.K.: Fusing a heterogeneous alert stream into scenarios. In: Proc. of the 2001 Workshop on Data Mining for Sec. App., pp. 1\u201313 (2001)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Duong, T.V., Bui, H.H., Phung, D.Q., Venkatesh, S.: Activity Recognition and Abnormality Detection with the Switching Hidden Semi-Markov Model. In: Proc. of IEEE CVPR-2005, vol.\u00a01, pp. 838\u2013845 (2005)","DOI":"10.1109\/CVPR.2005.61"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/BFb0013912","volume-title":"Computer Security - ESORICS 92","author":"N. Habra","year":"1992","unstructured":"Habra, N., Charlier, B., Mounji, A., Mathieu, I.: ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, pp. 435\u2013450. Springer, Heidelberg (1992)"},{"issue":"14","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1016\/j.artint.2009.05.002","volume":"173","author":"R. Hamid","year":"2009","unstructured":"Hamid, R., Maddi, S., Johnson, A.Y., Bobick, A.F., Essa, I.A., Isbel Jr., C.L.: A novel sequence representation for unsupervised analysis of human activities. Artificial Intelligence\u00a0173(14), 1221\u20131244 (2009)","journal-title":"Artificial Intelligence"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-1-4419-0140-8_7","volume-title":"Cyber Situational Awareness","author":"S. Jajodia","year":"2010","unstructured":"Jajodia, S., Noel, S.: Topological Vulnerability Analysis. In: Cyber Situational Awareness, pp. 139\u2013154. Springer, Heidelberg (2010)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"L\u00fchr, S., Bui, H.H., Venkatesh, S., West, G.A.W.: Recognition of human activity through hierarchical stochastic learning. In: Proc. of the 1st IEEE Intl. Conf. on Pervasive Computing and Comm. (PerCom-2003), pp. 416\u2013422 (2003)","DOI":"10.1109\/PERCOM.2003.1192766"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Ning, P., Xu, D.: Learning attack strategies from intrusion alerts. In: Proc. of the 10th Conf. on Computer and Comm. Security (CCS 2003), pp. 200\u2013209 (2003)","DOI":"10.1145\/948109.948137"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Noel, S., Robertson, E., Jajodia, S.: Correlating intrusion events and building attack scenarios through attack graph distances. In: Proc. of the 20th Annual Computer Security Applications Conference, ACSAC 2004, pp. 350\u2013359 (2004)","DOI":"10.1109\/CSAC.2004.11"},{"issue":"23-24","key":"4_CR11","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks\u00a031(23-24), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-45248-5_5","volume-title":"Recent Advances in Intrusion Detection","author":"X. Qin","year":"2003","unstructured":"Qin, X., Lee, W.: Statistical Causality Analysis of INFOSEC Alert Data. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 73\u201393. Springer, Heidelberg (2003)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2001","unstructured":"Valdes, A., Skinner, K.: Probabilistic Alert Correlation. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 54\u201368. Springer, Heidelberg (2001)"},{"issue":"15","key":"4_CR14","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1016\/j.comcom.2006.04.001","volume":"29","author":"L. Wang","year":"2006","unstructured":"Wang, L., Liu, A., Jajodia, S.: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Comm.\u00a029(15), 2917\u20132933 (2006)","journal-title":"Computer Comm."}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T10:52:41Z","timestamp":1742035961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}