{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:11Z","timestamp":1761611171149,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013912","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T02:24:15Z","timestamp":1132712655000},"page":"435-450","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["ASAX: Software architecture and rule-based language for universal audit trail analysis"],"prefix":"10.1007","author":[{"given":"Naji","family":"Habra","sequence":"first","affiliation":[]},{"given":"Baudouin Le","family":"Charlier","sequence":"additional","affiliation":[]},{"given":"Abdelaziz","family":"Mounji","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Mathieu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"24_CR1","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"J.P. Anderson","year":"1980","unstructured":"J.P. Anderson, \u201cComputer Security Threat Monitoring and Surveillance\u201d, J.P. Anderson Co, Fort Washington, PA, April 1980."},{"key":"24_CR2","unstructured":"N. Habra, B. Le Charlier, A. Mounji & I. Mathieu, \u201cPreliminary Report on Advanced Security Audit Trail Analysis on UniX\u201d, Research Report 1\/92, Institut d'Informatique, University of Namur, January 1992."},{"key":"24_CR3","unstructured":"N. Habra, B. Le Charlier & A. Mounji, \u201cAdvanced Security Audit Trail Analysis on UniX: Implementation Design of the NADF Evaluator\u201d, Research Report 7\/92, Institut d'Informatique, University of Namur, March 1992."},{"key":"24_CR4","unstructured":"A. Baur & W. Weiss, \u201cAudit Analysis Tool for Systems with High Demands Regarding Security and Access Control\u201d, Research Report, ZFE F2 SOF 42, Siemens Nixdorf Software, M\u00fcnchen, November 1988."},{"key":"24_CR5","unstructured":"K. Brunnstein, S. Fisher-H\u00fcbner & M. Swimmer, \u201cConcepts of an Expert System for Virus Detection\u201d, Proceedings of the 7th IFIP International Conference and Exhibition on Information Security, Brighton, UK, May 1991."},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"D.E. Denning, \u201cAn Intrusion-Detection Model\u201d, IEEE Transactions on Software Engineering, Vol.13, No.2, February 1987.","DOI":"10.1109\/TSE.1987.232894"},{"key":"24_CR7","unstructured":"Th.D. Garvey & T.F. Lunt, \u201cModel-Based Intrusion Detection\u201d, Proceedings of the 14th National Security Conference, Washington DC, October 1991."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"N. Habra, \u201cComputer-Aided Prototyping: A Transformational Approach\u201d, Information and Software Technology, Vol.33, No.9, November 1991.","DOI":"10.1016\/0950-5849(91)90042-A"},{"key":"24_CR9","unstructured":"T. Lunt, J. van Horne & L. Halme, \u201cAutomated Analysis of Computer System Audit Trails\u201d, Proceedings of the 9th DOE Computer Security Group Conference, May 1986."},{"key":"24_CR10","unstructured":"T.F. Lunt & R. Jagannathan, \u201cA Prototype Real-time Intrusion Detection Expert System\u201d, Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"T.F. Lunt, \u201cAutomated Audit Trail Analysis and Intrusion Detection: A Survey\u201d, Proceedings of the 11th National Security Conference, Baltimore, MD, October 1988.","DOI":"10.1016\/0167-4048(92)90256-Q"},{"key":"24_CR12","unstructured":"T.F. Lunt, R. Jagannathan, R. Lee, A. Whitehurst & S. Listgarten \u201cKnowledge Based Intrusion Detection\u201d, Proceedings of the 1989 AI Systems in Government Conference, Washington, DC, March 1989."},{"key":"24_CR13","unstructured":"T.F. Lunt, \u201cReal Time Intrusion Detection\u201d, Proceedings of the COMPCON spring 89', San Fransisco, CA, February, 1989."},{"key":"24_CR14","volume-title":"A Real-Time Intrusion-Detection Expert System","author":"T.F. Lunt","year":"1990","unstructured":"T.F. Lunt et. al., \u201cA Real-Time Intrusion-Detection Expert System\u201d, Interim Progress Report, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1990."},{"key":"24_CR15","unstructured":"R.D. Tennent, \u201cPrinciples of Programming Languages\u201d, Printice-Hall International, 1981"},{"key":"24_CR16","volume-title":"Expert Systems in Intrusion Detection: A Case Study","author":"R.A. Whitehurst","year":"1987","unstructured":"R.A. Whitehurst, \u201cExpert Systems in Intrusion Detection: A Case Study\u201d, Computer Science Laboratory, SRI International, Menlo Park, CA, November 1987."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:03:21Z","timestamp":1559505801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/bfb0013912","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}