{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:11:08Z","timestamp":1730207468753,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/cisda.2009.5356546","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T18:27:59Z","timestamp":1261679279000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing"],"prefix":"10.1109","author":[{"given":"Hilmi Gunes","family":"Kayacik","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm","family":"Heywood","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Burschka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Lookahead pairs and full sequences: A tale of two anomaly detection methods","author":"inoue","year":"2007","journal-title":"Proceedings of the 2nd Annual Symposium on Information Assurance (Academic track of the 10th NYS Cyber Security Conference)"},{"journal-title":"Genetic Programming An Introduction On the Automatic Evolution of Computer Programs and its Applications","year":"1998","author":"banzhaf","key":"ref11"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref12"},{"journal-title":"Multi-Objective Optimization Using Evolutionary Algorithms","year":"2001","author":"deb","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/106365602760234117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36415-3_1"},{"year":"0","key":"ref16","article-title":"Lbnl traceroute heap corruption vulnerability"},{"year":"1914","key":"ref17","article-title":"Redhat linux restore insecure environment variables vulnerability"},{"year":"0","key":"ref18","article-title":"Samba &#x2018;calLtrans2open&#x2019; remote buffer overflow vulnerability"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71805-5_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144271"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-36084-0_4","article-title":"Undermining an anomaly-based Intrusion Detection System using common exploits","volume":"2516","author":"tan","year":"2002","journal-title":"Recent Advance in Intrusion Detection (RAID)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.25"},{"key":"ref7","first-page":"717","article-title":"Automating mimicry attacks using static binary analysis","author":"kruegel","year":"2005","journal-title":"USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref1","first-page":"229","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of Thirteenth Systems Administration Conference"},{"article-title":"Operating system stability and security through process homeostasis","year":"2002","author":"somayaji","key":"ref9"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2009,7,8]]},"location":"Ottawa, ON","end":{"date-parts":[[2009,7,10]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5351161\/5356514\/05356546.pdf?arnumber=5356546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T16:19:56Z","timestamp":1580746796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5356546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cisda.2009.5356546","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}