{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:10Z","timestamp":1759133350480,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cdc.2002.1184714","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T15:38:00Z","timestamp":1061998680000},"page":"1402-1407","source":"Crossref","is-referenced-by-count":3,"title":["Control and estimation methods in information assurance - a tutorial on intrusion detection systems"],"prefix":"10.1109","volume":"2","author":[{"given":"J.B.D.","family":"Cabrera","sequence":"first","affiliation":[]},{"given":"R.K.","family":"Mehra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"A database of computer attacks for the evaluation of intrusion detection systems","year":"1999","author":"kendall","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/32.544350"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"36","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"0","journal-title":"Proc 1999 USENIX LISA Conference"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CACSD.2000.900190"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45164-1_15","article-title":"A multiple-model cost-sensitive approach for intrusion detection","author":"fan","year":"0","journal-title":"Proceedings of the Eleventh European Conference on Machine Learning 2000"},{"journal-title":"Introduction to Statistical Decision Theory","year":"1995","author":"pratt","key":"34"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1515\/9780691218632","author":"hamilton","year":"1994","journal-title":"Time Series Analysis"},{"journal-title":"Trust in Cyberspace","year":"1998","key":"39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821505"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1994.292495"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848452"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/6.887597"},{"journal-title":"High-Performance Communication Networks","year":"1996","author":"walrand","key":"41"},{"key":"40","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45474-8_11","article-title":"Experiences with specification-based intrusion detection","author":"uppuluri","year":"2001","journal-title":"Proc Recent Advances in Intrusion Detection (RAID 2001)"},{"key":"22","article-title":"Performance adaptation in real-time intrusion detection systems","author":"lee","year":"0","journal-title":"Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002) Zurich Switzerland October 2002"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-2002-101-202","article-title":"Toward cost-sensitive modeling for intrusion detection and response","author":"lee","year":"2002","journal-title":"Journal of Computer Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"25","first-page":"50","article-title":"Learning patterns from unix process execution traces for intrusion detection","author":"lee","year":"1997","journal-title":"Proceedings of AAAI97 Workshop on AI methods in Fraud and Risk Management"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-9396-9_28"},{"key":"27","article-title":"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation","volume":"2","author":"lippman","year":"2000","journal-title":"Proceedings of the 2000 DARPA Information Survivability Conference and Exposition"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/37.980245"},{"key":"29","first-page":"65","article-title":"Automated audit trail analysis and intrusion detection: A survey","author":"lunt","year":"1988","journal-title":"Proceedings of National Computer Security Conference"},{"article-title":"Computer security threat monitoring and surveillance","year":"1980","author":"anderson","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.21236\/ADA375846","article-title":"State of the practice of intrusion detection technologies","author":"allen","year":"2000"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918069"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/71.980028"},{"journal-title":"Knapsack Problems Algorithms and Computer Implementations","year":"1990","author":"martello","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2002.1184715"},{"article-title":"Intrusion detection systems: A taxonomy and survey","year":"2000","author":"axelsson","key":"6"},{"journal-title":"Network Intrusion Detection An Analyst s Handbook","year":"1999","author":"northcutt","key":"32"},{"article-title":"A preliminary attempt to apply detection and estimation theory to intrusion detection","year":"2000","author":"axelsson","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35508-5_3"},{"key":"4","article-title":"The base-rate fallacy and its implications for the difficulty of intrusion detection","author":"axelsson","year":"0","journal-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security Singapore November 1999"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015910917349"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604269"}],"event":{"name":"IEEE Conference on Decision and Control","acronym":"CDC-02","location":"Las Vegas, NV, USA"},"container-title":["Proceedings of the 41st IEEE Conference on Decision and Control, 2002."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8437\/26567\/01184714.pdf?arnumber=1184714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T11:12:26Z","timestamp":1623323546000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1184714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cdc.2002.1184714","relation":{},"subject":[]}}