{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:11:32Z","timestamp":1725898292150},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642340406"},{"type":"electronic","value":"9783642340413"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34041-3_11","type":"book-chapter","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T05:19:34Z","timestamp":1346995174000},"page":"67-75","source":"Crossref","is-referenced-by-count":0,"title":["Networks Intrusion Behavior Prediction Based on Threat Model"],"prefix":"10.1007","author":[{"given":"Dong","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhenlong","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Madhavan, J., Bernstein, P.A., Rahm, E.: Generic Schema Matching with Cupid. In: VLDB Conference, pp. 49\u201358 (2001)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Aum\u00fcller, D., Do, H.H., Massmann, S., Rahm, E.: Schema and ontology matching with COMA++. In: SIGMOD Conference, pp. 906\u2013908 (2005)","DOI":"10.1145\/1066157.1066283"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Do, H.H., Rahm, E.: COMA: A System for Flexible Combination of Schema Matching Approaches. In: VLDB Conference, pp. 610\u2013621 (2002)","DOI":"10.1016\/B978-155860869-6\/50060-3"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.inffus.2007.06.002","volume":"10","author":"S.J. Yang","year":"2009","unstructured":"Yang, S.J., Stotz, A., Holsopple, J., Sudit, M., Kuhl, M.: High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion\u00a010, 107\u2013121 (2009)","journal-title":"Information Fusion"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bremler-Barr, A., Hay, D., Koral, Y.: CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)","DOI":"10.1109\/INFCOM.2010.5462160"},{"key":"11_CR6","unstructured":"Kedar, N., Girija, N.: Robust and Fast Pattern Matching for Intrusion Detection. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Zheng, K., Zhang, X., Cai, Z.: Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)","DOI":"10.1109\/INFCOM.2010.5462152"},{"key":"11_CR8","unstructured":"Chen, F.: Multitarget attack graph based on a hierarchical network security risk assessment methods: [Ph.D Thesis]. National University of Defense Technology, Changsha (2009)"},{"issue":"7","key":"11_CR9","first-page":"1605","volume":"21","author":"Z. Gong","year":"2010","unstructured":"Gong, Z., Zhuo, Y.: Situational awareness of network. Journal of Software\u00a021(7), 1605\u20131619 (2010)","journal-title":"Journal of Software"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"3511","DOI":"10.1016\/j.proeng.2011.08.657","volume":"15","author":"D. Ma","year":"2011","unstructured":"Ma, D., Wang, Y., Fu, Z.: A synergetic pattern matching method based-on DHT structure for intrusion detection in large-scale network. Procedia Engineering\u00a015, 3511\u20133515 (2011); 2011 International Conference on Advanced in Control Engineering and Information Science, CEIS 2011","journal-title":"Procedia Engineering"}],"container-title":["Communications in Computer and Information Science","Information Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34041-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:41:55Z","timestamp":1620132115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34041-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340406","9783642340413"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34041-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}