{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:27:07Z","timestamp":1761708427495,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642102646"},{"type":"electronic","value":"9783642102653"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10265-3_18","type":"book-chapter","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T06:26:16Z","timestamp":1257834376000},"page":"192-202","source":"Crossref","is-referenced-by-count":7,"title":["From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Coppolino","sequence":"first","affiliation":[]},{"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Ivano Alessandro","family":"Elia","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Romano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., XiaoFeng, W., Wetzel, S.: Stealth attacks in vehicular technologies. In: Proc. of The Vehicular Technology IEEE Conference, September 26-29, vol.\u00a02, pp. 1218\u20131222 (2004)","DOI":"10.1109\/VETECF.2004.1400216"},{"key":"18_CR2","unstructured":"IDC, Worldwide threat Management Security Appliances 2007-2011 Forecast and 2006 Vendor Shares: Still Stacking the Racks, Doc # 209303 (November 2007)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Repp, N., Berbner, R., Heckmann, O., Steinmetz, R.: A Cross-Layer Approach to Performance Monitoring of Web Services. In: Proc. of the Workshop on Emerging Web Services Technology, CEUR-WS (December 2006)","DOI":"10.1007\/978-3-7643-8448-7_3"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Yu-Sung, W., Bagchi, S., Garg, S., Singh, N.: SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments. In: Proc. of Dependable Systems and Networks Conference, June 28, pp. 433\u2013442 (2004)","DOI":"10.1109\/DSN.2004.1311913"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Vigna, G., Robertson, W., Vishal, K., Kemmerer, R.A.: A stateful intrusion detection system for World-Wide Web servers. In: Proc. of 19th Annual Computer Security Applications Conference, December 8-12, pp. 34\u201343 (2003)","DOI":"10.1109\/CSAC.2003.1254308"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/948109.948144","volume-title":"Proc. of the 10th ACM conference on Computer and Communication Security (CCS 2003)","author":"C. Kruegel","year":"2003","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web based attacks. In: Proc. of the 10th ACM conference on Computer and Communication Security (CCS 2003), pp. 251\u2013261. ACM Press, New York (2003)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Majorczyk, F., Totel, E., M\u00e9, L., Sa\u00efdane, A.: Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. In: Proc. of The Ifip Tc 11 23rd International Information Security Conference, July 17, pp. 301\u2013315 (2008)","DOI":"10.1007\/978-0-387-09699-5_20"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Campanile, F., Cilardo, A., Coppolino, L., Romano, L.: Adaptable Parsing of Real-Time Data Streams. In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing, PDP 2007, February 7-9, pp. 412\u2013418 (2007)","DOI":"10.1109\/PDP.2007.16"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Fisher, Gruber, R.: PADS: a domain-specific language for processing ad hoc data. In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (2005)","DOI":"10.1145\/1065010.1065046"},{"key":"18_CR10","unstructured":"The Borealis project, http:\/\/www.cs.brown.edu\/research\/borealis\/public\/"},{"key":"18_CR11","unstructured":"apache-scalp, Apache log analyzer for security, http:\/\/code.google.com\/p\/apache-scalp\/"}],"container-title":["Lecture Notes in Computer Science","Software Technologies for Embedded and Ubiquitous Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10265-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T04:25:50Z","timestamp":1739420750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10265-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642102646","9783642102653"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10265-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}