{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:37:57Z","timestamp":1725619077446},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240126"},{"type":"electronic","value":"9783642240133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24013-3_20","type":"book-chapter","created":{"date-parts":[[2011,10,7]],"date-time":"2011-10-07T04:52:11Z","timestamp":1317963131000},"page":"203-212","source":"Crossref","is-referenced-by-count":0,"title":["Modeling Distributed Network Attacks with Constraints"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Salgueiro","sequence":"first","affiliation":[]},{"given":"Salvador","family":"Abreu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"229","volume-title":"LISA 1999: Proceedings of the 13th USENIX Conference on System Administration","author":"M. Roesch","year":"1999","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration, pp. 229\u2013238. USENIX Association, USA (1999)"},{"key":"20_CR2","volume-title":"Handbook of constraint programming","author":"F. Rossi","year":"2006","unstructured":"Rossi, F., Van Beek, P., Walsh, T.: Handbook of constraint programming. Elsevier Science, Amsterdam (2006)"},{"key":"20_CR3","volume-title":"Constraint-based local search","author":"P. Hentenryck Van","year":"2005","unstructured":"Van Hentenryck, P., Michel, L.: Constraint-based local search. MIT Press, Cambridge (2005)"},{"key":"20_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-18378-2_11","volume-title":"PADL 2011 - Thirteenth International Symposium on Practical Aspects of Declarative Languages","author":"P. Salgueiro","year":"2011","unstructured":"Salgueiro, P., Diaz, D., Brito, I., Abreu, S.: Using Constraints for Intrusion Detection: the NeMODe System. In: Rocha, R., Launchbury, J. (eds.) PADL 2011. LNCS, vol.\u00a06539, pp. 115\u2013129. Springer, Heidelberg (2011)"},{"key":"20_CR5","first-page":"224","volume-title":"Proceedings of The 3Rd International Conference on Security of Information and Networks, SIN 2010","author":"P.D. Salgueiro","year":"2010","unstructured":"Salgueiro, P.D., Abreu, S.P.: A dsl for intrusion detection based on constraint programming. In: Proceedings of The 3Rd International Conference on Security of Information and Networks, SIN 2010, pp. 224\u2013332. ACM, USA (2010)"},{"key":"20_CR6","volume-title":"Internetworking With TCP\/IP Volume 1: Principles Protocols, and Architecture","author":"D. Comer","year":"2006","unstructured":"Comer, D.: Internetworking With TCP\/IP Volume 1: Principles Protocols, and Architecture, 5th edn. Prentice Hall, Englewood Cliffs (2006)","edition":"5"},{"key":"20_CR7","first-page":"283","volume-title":"Proceedings of The 6Th Annual International Conference on Mobile Computing and Networking","author":"Y. Zhang","year":"2000","unstructured":"Zhang, Y., Lee, W.: ntrusion detection in wireless ad-hoc networks. In: Proceedings of The 6Th Annual International Conference on Mobile Computing and Networking, p. 283. ACM, New York (2000)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Arun, K.S.P.: Flow-aware cross packet inspection using bloom filters for high speed data-path content matching. In: IEEE International Advance Computing Conference, IACC 2009, vol.\u00a06-7, pp. 1230\u20131234 (2009)","DOI":"10.1109\/IADCC.2009.4809191"},{"key":"20_CR9","unstructured":"Kumar, S., Spafford, E.H.: A software architecture to support misuse intrusion detection. In: Proceedings of The 18th National Information Security Conference, pp. 194\u2013204 (1995)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-540-30201-8_45","volume-title":"Principles and Practice of Constraint Programming \u2013 CP 2004","author":"C. Schulte","year":"2004","unstructured":"Schulte, C., Stuckey, P.J.: Speeding up constraint propagation. In: Wallace, M. (ed.) CP 2004. LNCS, vol.\u00a03258, pp. 619\u2013633. Springer, Heidelberg (2004)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-45322-9_5","volume-title":"Stochastic Algorithms: Foundations and Applications","author":"P. Codognet","year":"2001","unstructured":"Codognet, P., Diaz, D.: Yet another local search method for constraint solving. In: Steinh\u00f6fel, K. (ed.) SAGA 2001. LNCS, vol.\u00a02264, p. 73. Springer, Heidelberg (2001)"},{"key":"20_CR12","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-15211-5_28","volume-title":"Intelligent Distributed Computing IV","author":"D. Diaz","year":"2010","unstructured":"Diaz, D., Abreu, S., Codognet, P.: Parallel constraint-based local search on the cell\/BE multicore architecture. In: Essaaidi, M., Malgeri, M., Badica, C. (eds.) Intelligent Distributed Computing IV. Studies in Computational Intelligence, vol.\u00a0315, pp. 265\u2013274. Springer, Heidelberg (2010)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24013-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T12:03:19Z","timestamp":1620043399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24013-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240126","9783642240133"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24013-3_20","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2011]]}}}