{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:32:07Z","timestamp":1770967927946,"version":"3.50.1"},"reference-count":10,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1108\/09685220610707430","type":"journal-article","created":{"date-parts":[[2006,10,10]],"date-time":"2006-10-10T09:44:12Z","timestamp":1160473452000},"page":"417-435","source":"Crossref","is-referenced-by-count":8,"title":["Security information management as an outsourced service"],"prefix":"10.1108","volume":"14","author":[{"given":"Herv\u00e9","family":"Debar","sequence":"first","affiliation":[]},{"given":"Jouni","family":"Viinikka","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b6","doi-asserted-by":"crossref","unstructured":"Debar, H. and Morin, B. (2002), \u201cEvaluation of the diagnostic capabilities of commercial intrusion detection systems\u201d,Proceedings of the Fifth International Workshop on the Recent Advances in Intrusion Detection (RAID).","DOI":"10.1007\/3-540-36084-0_10"},{"key":"b2","unstructured":"Debar, H., Curry, D. and Feinstein, B. (2005), \u201cThe intrusion detection message exchange format\u201d,Internet Draft, work in progress, expires July 31, 2005, this document is currently being updated and will reappear either as an Internet draft or a RFC."},{"key":"b1","doi-asserted-by":"crossref","unstructured":"Droms, R. (1997), \u201cDynamic host configuration protocol\u201d,RFC, Vol. 2131.","DOI":"10.17487\/rfc2131"},{"key":"b5","doi-asserted-by":"crossref","unstructured":"Egevang, K. and Francis, P. (1994), \u201cThe IP network address translator (nat)\u201d,RFC, Vol. 1631.","DOI":"10.17487\/rfc1631"},{"key":"b8","doi-asserted-by":"crossref","unstructured":"Julisch, K. (2001), \u201cMining alarm clusters to improve alarm handling efficiency\u201d,Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC).","DOI":"10.1109\/ACSAC.2001.991517"},{"key":"b3","doi-asserted-by":"crossref","unstructured":"Morin, B., M\u00e9, L., Debar, H. and Ducass\u00e9, M. (2002), \u201cM2D2: a formal data model for IDS alert correlation\u201d,Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID).","DOI":"10.1007\/3-540-36084-0_7"},{"key":"b7","doi-asserted-by":"crossref","unstructured":"Porras, P.A., Fong, M.W. and Valdes, A. (2002), \u201cMission\u2010impact\u2010based approach to INFOSEC alarm correlation\u201d,Proceedings of RAID 2002, pp. 95\u2010114.","DOI":"10.1007\/3-540-36084-0_6"},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1959.10489860"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1002\/qre.493"},{"key":"b11","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.805796"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220610707430","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220610707430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:59Z","timestamp":1753402139000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/14\/5\/417-435\/174862"}},"subtitle":[],"editor":[{"given":"Sokratis K.","family":"Katsikas","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["10.1108\/09685220610707430"],"URL":"https:\/\/doi.org\/10.1108\/09685220610707430","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}