{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:20:05Z","timestamp":1757542805148},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_37","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"275-282","source":"Crossref","is-referenced-by-count":9,"title":["Multi-stage Attack Detection Algorithm Based on Hidden Markov Model"],"prefix":"10.1007","author":[{"given":"Nurbol","family":"Luktarhan","sequence":"first","affiliation":[]},{"given":"Xue","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Nannan","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Symantec Global Internet Security Threat Report trends, \n                    \n                      http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/bwhitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf","key":"37_CR1"},{"unstructured":"Symantec Internet Security Threat Reaport, \n                    \n                      http:\/\/www.symantec.com\/zh\/cn\/theme.jsp?themeid=istr","key":"37_CR2"},{"unstructured":"Li, W.: Study on Method of network Multi-stage Attack Plan Recognition, Wu Han (2007)","key":"37_CR3"},{"key":"37_CR4","first-page":"146","volume-title":"Proceedings of the IEEE Comuter Society Symposium on Research in Security and Privacy","author":"U. Lindqvist","year":"1999","unstructured":"Lindqvist, U., Porras, P.A.: Detecting computer and network misuse throughproduction-based exstemsy system toolset (P-BEST). In: Proceedings of the IEEE Comuter Society Symposium on Research in Security and Privacy, pp. 146\u2013161. IEEE Press, Washington, D.C. (1999)"},{"key":"37_CR5","first-page":"106","volume":"16","author":"Y. Liang","year":"2003","unstructured":"Liang, Y., Zhou, J., Yan, P.: Network Intrusion Detection System Based on CPN and Mobile Agent. J. Computer Engineering\u00a016, 106\u2013108 (2003)","journal-title":"J. Computer Engineering"},{"issue":"8","key":"37_CR6","first-page":"19","volume":"29","author":"Y. Sun","year":"2007","unstructured":"Sun, Y., Zhong, Q., Su, J.: Research on Intention Recognition Based on HMM. J. Computer Engineering & Science\u00a029(8), 19\u201322 (2007)","journal-title":"J. Computer Engineering & Science"},{"key":"37_CR7","first-page":"3","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference","author":"J. Balthrop","year":"2002","unstructured":"Balthrop, J., Esponda, F., Forrest, S., et al.: Coverage and Generalization in an Artificial Immune System. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 3\u201310. Morgan Kaufmann, New York (2002)"},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-39945-3_6","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2000","unstructured":"Valdes, A., Skinner, K.: Adaptive, Model-Based Monitoring for Cyber Attack Detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 80\u201392. Springer, Heidelberg (2000)"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","volume":"10","author":"T. Pietraszek","year":"2005","unstructured":"Pietraszek, T., Tanner, A.: Data mining and machine learning-Towards reducing false positives in intrusion detection. Information Security Technical Report\u00a010, 169\u2013183 (2005)","journal-title":"Information Security Technical Report"},{"doi-asserted-by":"crossref","unstructured":"Templeton, S.J., Levitt, K.: A requires\/provides model for computer attacks. In: Proceedings of the New Security Paradigms Workshop 2000, Cork Ireland, pp. 31\u201338 (2000)","key":"37_CR10","DOI":"10.1145\/366173.366187"},{"unstructured":"Zhong, A.M., Jia, C.F.: Study on the application of hidden Markov models to computer intrusion detection. In: Proceedings of the 5th World Congress on Intelligent Control and Automation, pp. 4352\u20134357 (2004)","key":"37_CR11"},{"key":"37_CR12","first-page":"9","volume":"1","author":"X. Chen","year":"2011","unstructured":"Chen, X., Wen, Z.: The Research on Network Intrusion Detection Method Based on RBF-HMM. J. Network Security\u00a01, 9\u201311 (2011)","journal-title":"J. Network Security"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:10:49Z","timestamp":1620130249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}