{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:58:09Z","timestamp":1725641889824},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_8","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T09:37:08Z","timestamp":1323423428000},"page":"48-54","source":"Crossref","is-referenced-by-count":4,"title":["Network Event Correlation and Semantic Reasoning for Federated Networks Protection System"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Enabling and managing end-to-end resilience, ENISA (European Network and Information Security Agency) Report (January 2011)","key":"8_CR1"},{"key":"8_CR2","first-page":"171","volume-title":"Proc. of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010","author":"M. Chora\u015b","year":"2010","unstructured":"Chora\u015b, M., D\u2019Antonio, S., Kozik, R., Holubowicz, W.: INTERSECTION Approach to Vulnerability Handling. In: Proc. of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, vol.\u00a01, pp. 171\u2013174. INSTICC Press, Valencia (2010)"},{"unstructured":"NATO Network Enabled Feasibility Study Volume II: Detailed Report Covering a Strategy and Roadmap for Realizing an NNEC Networking and Information Infrastructure (NII), version 2.0","key":"8_CR3"},{"doi-asserted-by":"crossref","unstructured":"El-Damhougy, Yousefizadeh, H., Lofquist, H., Sackman, D., Crowley, R.: Hierarchical and federated network management for tactical environments. In: Proc. of IEEE Military Communications Conference MILCOM, vol.\u00a04, pp. 2062\u20132067 (2005)","key":"8_CR4","DOI":"10.1109\/MILCOM.2005.1605974"},{"unstructured":"Calo, S., Wood, D., Zerfos, P., Vyvyan, D., Dantressangle, P., Bent, G.: Technologies for Federation and Interoperation of Coalition Networks. In: Proc. of 12th International Conference on Information Fusion, Seattle (2009)","key":"8_CR5"},{"unstructured":"Coppolino, L., D\u2019Antonio, L., Esposito, M., Romano, L.: Exploiting diversity and correlation to improve the performance of intrusion detection systems. In: Proc. of IFIP\/IEEE International Conference on Network and Service (2009)","key":"8_CR6"},{"unstructured":"SCALP project homepage, http:\/\/code.google.com\/p\/apache-scalp\/","key":"8_CR7"},{"unstructured":"PHPIDS project homepage, http:\/\/code.google.com\/p\/phpids\/","key":"8_CR8"},{"unstructured":"SEC project homepage, http:\/\/simple-evcorr.sourceforge.net\/","key":"8_CR9"},{"unstructured":"SNORT project homepage, http:\/\/www.snort.org\/","key":"8_CR10"},{"doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Saganowski, L., Renk, R., Holubowicz, W.: Statistical and signal-based network traffic recognition for anomaly detection, Expert Systems (Early View) (2011) doi: 10.1111\/j.1468-0394.2010.00576.x","key":"8_CR11","DOI":"10.1111\/j.1468-0394.2010.00576.x"},{"unstructured":"ARAKIS project homepage, http:\/\/www.arakis.pl","key":"8_CR12"},{"unstructured":"HSN project homepage, http:\/\/www.honeyspider.net\/","key":"8_CR13"},{"issue":"3","key":"8_CR14","first-page":"36","volume":"12","author":"R. Neches","year":"1991","unstructured":"Neches, R., Fikes, R., Finin, T., Gruber, T., Patil, R., Senator, T., Swartout, W.R.: Enabling Technology for Knowledge Sharing. AI Magazine 12(3), s.36\u2013s.56 (1991)","journal-title":"AI Magazine"},{"unstructured":"OWL Web Ontology Language Semantics and Abstract Syntax (June 2006), http:\/\/www.w3.org\/TR\/owl-features\/","key":"8_CR15"},{"unstructured":"SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http:\/\/www.w3.org\/Submission\/SWRL\/","key":"8_CR16"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:49:38Z","timestamp":1561038578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}