{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T05:23:34Z","timestamp":1749878614616},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346858","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:19:48Z","timestamp":1449595188000},"page":"460-468","source":"Crossref","is-referenced-by-count":4,"title":["Towards a science of anomaly detection system evasion"],"prefix":"10.1109","author":[{"given":"Muhammad Qasim","family":"Ali","sequence":"first","affiliation":[]},{"given":"Ayesha Binte","family":"Ashfaq","sequence":"additional","affiliation":[]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Duan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501981"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930147"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967988"},{"key":"ref13","first-page":"4057","article-title":"Distributed strategic learning with application to network security","author":"zhu","year":"2011","journal-title":"American Control Conference (ACC)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399894"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/978-3-540-87403-4_19","article-title":"A comparative evaluation of anomaly detectors under portscan attacks","author":"ashfaq","year":"2008","journal-title":"Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08)"},{"year":"0","key":"ref17","article-title":"Symantec security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.59"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330110"},{"key":"ref4","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","author":"ptacek","year":"1998","journal-title":"DTIC Document Tech Rep"},{"key":"ref3","article-title":"Computer worms: Architectures, evasion strategies, and detection mechanisms","author":"smith","year":"2008","journal-title":"Journal of Information Assurance and Security"},{"key":"ref6","first-page":"11","article-title":"Au-tomating mimicry attacks using static binary analysis","author":"kruegel","year":"2005","journal-title":"Proceedings of the 14th conference on USENIX Security Symposium USENIX Association"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180414"},{"key":"ref2","article-title":"Full system emulation: Achieving successful automated dynamic analysis of evasive malware","author":"kruegel","year":"2014","journal-title":"Blackhat USA Technical Security Conference"},{"key":"ref1","first-page":"115","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512529"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445569"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346858.pdf?arnumber=7346858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T21:10:46Z","timestamp":1498252246000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346858","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}