{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:28:23Z","timestamp":1767770903326,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_18","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"278-292","source":"Crossref","is-referenced-by-count":6,"title":["Extracting Attack Scenarios Using Intrusion Semantics"],"prefix":"10.1007","author":[{"given":"Sherif","family":"Saad","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abdoli, F., Kahani, M.: Using attacks ontology in distributed intrusion detection system. In: SCSS (1), pp. 153\u2013158 (2007)","DOI":"10.1007\/978-1-4020-8741-7_28"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Al-Mamory, S.O., Zhang, H.L.: Scenario discovery using abstracted correlation graph. In: 2007 International Conference on Computational Intelligence and Security, pp. 702\u2013706 (December 2007)","DOI":"10.1109\/CIS.2007.21"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Ding, Y.-X., Wang, H.-S., Liu, Q.-W.: Intrusion scenarios detection based on data mining. In: 2008 International Conference on Machine Learning and Cybernetics, vol.\u00a03, pp. 1293\u20131297 (July 2008)","DOI":"10.1109\/ICMLC.2008.4620604"},{"key":"18_CR4","series-title":"AISC","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-00487-2_25","volume-title":"7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009)","author":"G.A. Isaza","year":"2009","unstructured":"Isaza, G.A., Castillo, A.G., Duque, N.D.: An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies. In: Demazeau, Y., Pav\u00f3n, J., Corchado, J.M., Bajo, J. (eds.) 7th International Conference on PAAMS 2009. AISC, vol.\u00a055, pp. 237\u2013245. Springer, Heidelberg (2009)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Li, W., Zhi-tang, L., Dong, L., Jie, L.: Attack scenario construction with a new sequential mining technique. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, SNPD 2007, July 30-August 1, vol.\u00a01, pp. 872\u2013877 (2007)","DOI":"10.1109\/SNPD.2007.395"},{"key":"18_CR6","unstructured":"Lincoln-Laboratory-MIT. Darpa intrusion detection evaluation, http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/CST\/index.html"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, C., Chen, S.: Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling. In: International Conference on Information Security and Assurance, ISA 2008, pp. 214\u2013219 (April 2008)","DOI":"10.1109\/ISA.2008.11"},{"key":"18_CR8","first-page":"245","volume-title":"CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"P. Ning","year":"2002","unstructured":"Ning, P., Cui, Y., Reeves, D.S.: Constructing attack scenarios through correlation of intrusion alerts. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 245\u2013254. ACM, New York (2002)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Rhee, S.K., Lee, J., Park, M.-W.: Semantic relevance measure between resources based on a graph structure. In: International Multiconference on Computer Science and Information Technology, IMCSIT 2008, pp. 229\u2013236 (October 2008)","DOI":"10.1109\/IMCSIT.2008.4747244"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1007\/978-3-540-74469-6_66","volume-title":"Database and Expert Systems Applications","author":"T. Ruotsalo","year":"2007","unstructured":"Ruotsalo, T., Hyvonen, E.: A Method for Determining Ontology-Based Semantic Relevance. In: Wagner, R., Revell, N., Pernul, G. (eds.) DEXA 2007. LNCS, vol.\u00a04653, pp. 680\u2013688. Springer, Heidelberg (2007)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Saad, S., Traore, I.: Method ontology for intelligent network forensics analysis. In: Eight International Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, pp. 7\u201314 (August 2010)","DOI":"10.1109\/PST.2010.5593235"},{"key":"18_CR12","unstructured":"UCSB. The 2002 UCSB treasure hunt dataset, http:\/\/ictf.cs.ucsb.edu\/data\/treasurehunt2002\/"},{"key":"18_CR13","unstructured":"Undercoffer, J.L., Joshi, A., Finin, T., Pinkston, J.: A Target-Centric Ontology for Intrusion Detection. In: The 18th International Joint Conference on Artificial Intelligence (July 2003)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:07Z","timestamp":1745979187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}