{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T06:04:17Z","timestamp":1749621857393,"version":"3.37.3"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,20]]},"DOI":"10.1109\/ciot57267.2023.10084911","type":"proceedings-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T17:27:05Z","timestamp":1680542825000},"page":"163-170","source":"Crossref","is-referenced-by-count":1,"title":["Generative Pattern Dissemination for Collaborative Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Mike","family":"Petersen","sequence":"first","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Christoph","family":"Hardegen","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Ulrich","family":"Buehler","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"article-title":"Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures","volume-title":"Workshop on Collaborative Methods for Security and Privacy","author":"Bye","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004372"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87353-2_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410282"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.180"},{"article-title":"When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions","volume-title":"AAAI National Conference on Articial Intelligence","author":"Dash","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932438"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00095"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922692"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app9204221"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"article-title":"An Intrusion Detection System Implemented with Instance Selection based on Locality Sensitive Hashing for Data Reduction","volume-title":"European Wireless Conference","author":"Baldini","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106716"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2014.6936960"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030086"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1331021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CommNet56067.2022.9993965"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05440-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705027"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"ref24","article-title":"Enhanced Data Security in Collaborative Intrusion Detection System","author":"Ezelu","year":"2022","journal-title":"World Congress in Computer Science, Computer Engineering, & Applied Computing"},{"volume-title":"A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018)","year":"2018","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"}],"event":{"name":"2023 6th Conference on Cloud and Internet of Things (CIoT)","start":{"date-parts":[[2023,3,20]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2023,3,22]]}},"container-title":["2023 6th Conference on Cloud and Internet of Things (CIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10084443\/10084872\/10084911.pdf?arnumber=10084911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T19:11:57Z","timestamp":1707851517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10084911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,20]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ciot57267.2023.10084911","relation":{},"subject":[],"published":{"date-parts":[[2023,3,20]]}}}