{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:25:36Z","timestamp":1761611136472,"version":"build-2065373602"},"reference-count":18,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3893,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s1571-0661(04)80574-7","type":"journal-article","created":{"date-parts":[[2004,9,29]],"date-time":"2004-09-29T12:47:47Z","timestamp":1096462067000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"title":["Requirements for a Practical Network Event Recognition Language"],"prefix":"10.1016","volume":"70","author":[{"given":"Karthikeyan","family":"Bhargavan","sequence":"first","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB1","doi-asserted-by":"crossref","unstructured":"Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, and Carl A. Gunter. What packets may come: Automata for network monitoring. In Proceedings of the Symposium on Principles of Programming Languages (POPL'01), pages 206\u2013219. ACM Press, January 2001.","DOI":"10.1145\/360204.360221"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB2","unstructured":"Karthikeyan Bhargavan and Carl A. Gunter. Network event recognition for packet-mode surveillance. Submitted for publication, 2002."},{"issue":"2","key":"10.1016\/S1571-0661(04)80574-7_NEWBIB3","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/32.988495","article-title":"Verisim: Formal analysis of network simulations","volume":"28","author":"Bhargavan","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB4","doi-asserted-by":"crossref","unstructured":"D. Crocker. Standard for the Format of ARPA Internet Text Messages. Technical Report RFC 822, IETF, 1982.","DOI":"10.17487\/rfc0822"},{"issue":"3","key":"10.1016\/S1571-0661(04)80574-7_NEWBIB5","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/52.896248","article-title":"A reference model for requirements and specifications","volume":"17","author":"Gunter","year":"2000","journal-title":"IEEE Software"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB6","doi-asserted-by":"crossref","unstructured":"NSS Group. Intrusion detection systems - group test, December 2001.","DOI":"10.1016\/S1361-3723(01)00614-5"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB7","unstructured":"Gerard J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991. http:\/\/cm.bell-labs.com\/cm\/cs\/what\/spin\/Doc\/Book91.html"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB8","series-title":"Logic verification of ANSI-C code with SPIN, LNCS 1885","first-page":"131","author":"Holzmann","year":"2000"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB9","doi-asserted-by":"crossref","unstructured":"Eddie Kohler, M. Frans Kaashoek, and David R. Montgomery. A readable TCP in the Prolac protocol language. In Proceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 3\u201313, Cambridge, Massachusetts, August 1999","DOI":"10.1145\/316188.316200"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB10","unstructured":"David C. Luckham and Brian Frasca. Complex event processing in distributed systems. Technical Report CSL-TR-98-754, Stanford University, 1998"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB11","unstructured":"I. Lee, S. Kannan, M. Kim, O. Sokolsky, and M. Viswanathan. Runtime assurance based on formal specifications. In Proceedings International Conference on Parallel and Distributed Processing Techniques and Applications, 1999"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB12","doi-asserted-by":"crossref","unstructured":"Peter McCann and Satish Chandra. PacketTypes: Abstract specification of network protocol messages. In ACM Conference of Special Interest Group on Data Communications (SIGCOMM), August 2000","DOI":"10.1145\/347057.347563"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB13","unstructured":"T. O. O'Malley, D. J. Richardson, and L. K. Dillon. Efficient specification-based test oracles. In Second California Software Symposium (CSS'96), April 1996"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB14","doi-asserted-by":"crossref","unstructured":"V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31:2435\u20132463, 14 December 1999. This paper is a revision of paper that previously appeared in Proc. 7th USENIX Security Symposium, January 1998","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB15","unstructured":"J. R. Pickens and D. J. Farber. The Overseer: A powerful communications attribute for debugging and security in thin-wire connected control structures. In Proceedings of International Computer Communications Conference, August 1976"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB16","doi-asserted-by":"crossref","unstructured":"Jonathan B. Postel. Simple Mail Transfer Protocol. Technical Report RFC 821, IETF, 1982","DOI":"10.17487\/rfc0821"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB17","unstructured":"Stephen P. Smith, J. Allen Crider, Jr. Henry Perrit, Mengfen Shyong, Harold Krent, Larry L. Reynolds, and Stephen Mencik. Independent review of the Carnivore system - final report. Technical report, IIT Research Institute, December 2000"},{"key":"10.1016\/S1571-0661(04)80574-7_NEWBIB18","unstructured":"Jonathan M. Smith, David J. Farber, Carl A. Gunter, Sampath Kannan, Insup Lee, and Scott M. Nettles. Self-checking active networks (SCAN). Online at http:\/\/www.cis.upenn.edu\/jms\/SCAN.html"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104805747?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104805747?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:06:12Z","timestamp":1761609972000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104805747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S1571066104805747"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80574-7","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2002,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Requirements for a Practical Network Event Recognition Language","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)80574-7","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}