{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:44:43Z","timestamp":1722912283597},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cdc.2002.1184715","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T15:38:00Z","timestamp":1061998680000},"page":"1408-1413","source":"Crossref","is-referenced-by-count":3,"title":["Optimization and control problems in Real-time Intrusion Detection"],"prefix":"10.1109","volume":"2","author":[{"given":"J.B.D.","family":"Cabrera","sequence":"first","affiliation":[]},{"given":"W.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"R.K.","family":"Prasanth","sequence":"additional","affiliation":[]},{"given":"L.","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"R.K.","family":"Mehra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-2002-101-202","article-title":"Toward Cost-Sensitive Modeling for Intrusion Detection and Response","author":"lee","year":"2002","journal-title":"Journal of Computer Security"},{"journal-title":"Network Intrusion Detection An Analyst s Handbook","year":"1999","author":"northcutt","key":"ref11"},{"journal-title":"Combinatorial Optimization Algorithms and Complexity","year":"1982","author":"papadimitriou","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref14","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","author":"ptacek","year":"1998","journal-title":"Technical Report"},{"key":"ref15","article-title":"Snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the USENIX USA Conference"},{"key":"ref16","article-title":"Dragon claws its way to the top","author":"shipley","year":"2001","journal-title":"Network Computing"},{"journal-title":"Detection Estimation and Modulation Theory Part I ? Detection Estimation and Linear Modulation Theory","year":"1968","author":"trees","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1994.292495"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2002.1184714"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/227683.227684"},{"key":"ref5","article-title":"A multiple-model cost-sensitive approach for intrusion detection","author":"fan","year":"2000","journal-title":"Proc of the Eleventh European Conf On Machine Learning"},{"journal-title":"Queueing Systems vol I Theory","year":"1975","author":"kleinrock","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924287"},{"journal-title":"Aspects of Set Packing Partitioning and Covering","year":"1998","author":"bornd\u00f6rfer","key":"ref2"},{"journal-title":"Intrusion Detection An Introduction to Internet Surveillance Correlation Traps Trace Back and Response","year":"1999","author":"amoroso","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_14","article-title":"Performance Adaptation in Real-Time Intrusion Detection Systems","author":"lee","year":"2002","journal-title":"Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)"}],"event":{"name":"IEEE Conference on Decision and Control","acronym":"CDC-02","location":"Las Vegas, NV, USA"},"container-title":["Proceedings of the 41st IEEE Conference on Decision and Control, 2002."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8437\/26567\/01184715.pdf?arnumber=1184715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T16:14:22Z","timestamp":1520266462000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1184715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cdc.2002.1184715","relation":{},"subject":[]}}