{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:03:15Z","timestamp":1742947395135,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642183775"},{"type":"electronic","value":"9783642183782"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18378-2_11","type":"book-chapter","created":{"date-parts":[[2011,1,20]],"date-time":"2011-01-20T09:18:08Z","timestamp":1295515088000},"page":"115-129","source":"Crossref","is-referenced-by-count":7,"title":["Using Constraints for Intrusion Detection: The NeMODe System"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Salgueiro","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Diaz","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Brito","sequence":"additional","affiliation":[]},{"given":"Salvador","family":"Abreu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Handbook of constraint programming","author":"F. Rossi","year":"2006","unstructured":"Rossi, F., Van Beek, P., Walsh, T.: Handbook of constraint programming. Elsevier Science, Amsterdam (2006)"},{"issue":"6","key":"11_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/352029.352035","volume":"35","author":"A. Deursen Van","year":"2000","unstructured":"Van Deursen, A., Visser, J.: Domain-specific languages: An annotated bibliography. ACM Sigplan Notices\u00a035(6), 26\u201336 (2000)","journal-title":"ACM Sigplan Notices"},{"key":"11_CR3","unstructured":"Gecode Team: Gecode: Generic constraint development environment (2008), \n                    \n                      http:\/\/www.gecode.org"},{"key":"11_CR4","unstructured":"Salgueiro, P., Abreu, S.: Network Monitoring with Constraint Programming: Preliminary Specification and Analysis. In: Proceedings of the 18th International Conference on Applications of Declarative Programming and Knowledge Management (2009)"},{"key":"11_CR5","volume-title":"SIN 2010: Proceedings of the 3rd International Conference on Security of Information and Networks","author":"P. Salgueiro","year":"2010","unstructured":"Salgueiro, P., Abreu, S.: A DSL for Intrusion Detection based on Constraint Programming. In: SIN 2010: Proceedings of the 3rd International Conference on Security of Information and Networks. ACM, New York (2010)"},{"key":"11_CR6","unstructured":"Salgueiro, P., Abreu, S.: On using Constraints for Network Intrusion Detection. In: INForum 2010 - Simp\u00f3sio de Inform\u00e1tica, Braga, Portugal (2010)"},{"key":"11_CR7","series-title":"Principles Protocols, and Architecture","volume-title":"Internetworking With TCP\/IP","author":"D. Comer","year":"2006","unstructured":"Comer, D.: Internetworking With TCP\/IP, 5th edn. Principles Protocols, and Architecture, vol.\u00a01. Prentice Hall, Englewood Cliffs (2006)","edition":"5"},{"key":"11_CR8","first-page":"283","volume-title":"Proceedings of the 6th Annual International Conference on Mobile Computing and Networking","author":"Y. Zhang","year":"2000","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, p. 283. ACM, New York (2000)"},{"key":"11_CR9","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 229\u2013238. USENIX Association (1999)"},{"key":"11_CR10","unstructured":"Arun, K.S.P.: Flow-aware cross packet inspection using bloom filters for high speed data-path content matching. In: IEEE International Advance Computing Conference, IACC 2009, pp. 1230\u20131234 (June 6-7, 2009)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-642-04342-0_14","volume-title":"RAID 2009","author":"G. Vasiliadis","year":"2009","unstructured":"Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., Ioannidis, S.: Regular Expression Matching on Graphics Hardware for Intrusion Detection. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol.\u00a05758, pp. 265\u2013283. Springer, Heidelberg (2009)"},{"key":"11_CR12","unstructured":"Kumar, S., Spafford, E.H.: A software architecture to support misuse intrusion detection. In: Proceedings of the 18th National Information Security Conference, pp. 194\u2013204 (1995)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-540-30201-8_45","volume-title":"Principles and Practice of Constraint Programming \u2013 CP 2004","author":"C. Schulte","year":"2004","unstructured":"Schulte, C., Stuckey, P.J.: Speeding up constraint propagation. In: Wallace, M. (ed.) CP 2004. LNCS, vol.\u00a03258, pp. 619\u2013633. Springer, Heidelberg (2004)"},{"key":"11_CR14","volume-title":"Constraint-based local search","author":"P. Hentenryck Van","year":"2005","unstructured":"Van Hentenryck, P., Michel, L.: Constraint-based local search. MIT Press, Cambridge (2005)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-45322-9_5","volume-title":"Stochastic Algorithms: Foundations and Applications","author":"P. Codognet","year":"2001","unstructured":"Codognet, P., D\u00edaz, D.: Yet another local search method for constraint solving. In: Steinh\u00f6fel, K. (ed.) SAGA 2001. LNCS, vol.\u00a02264, pp. 73\u201390. Springer, Heidelberg (2001)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Abreu, S., Diaz, D., Codognet, P.: Parallel local search for solving constraint problems on the cell broadband engine (preliminary results). CoRR, abs\/0910.1264 (2009)","DOI":"10.4204\/EPTCS.5.8"},{"issue":"23-24","key":"11_CR17","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time* 1. Computer networks\u00a031(23-24), 2435\u20132463 (1999)","journal-title":"Computer networks"},{"key":"11_CR18","unstructured":"tcpdump web page at \n                    \n                      http:\/\/www.tcpdump.org\n                    \n                    \n                   (April 2009)"}],"container-title":["Lecture Notes in Computer Science","Practical Aspects of Declarative Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18378-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:51:55Z","timestamp":1558295515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18378-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642183775","9783642183782"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18378-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}