{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:15:50Z","timestamp":1740100550679,"version":"3.37.3"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,4]]},"DOI":"10.1109\/cns53000.2021.9705027","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T20:28:04Z","timestamp":1644524884000},"page":"128-136","source":"Crossref","is-referenced-by-count":8,"title":["A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Hardegen","sequence":"first","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Mike","family":"Petersen","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Chukwuebuka","family":"Ezelu","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Timo","family":"Geier","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Sebastian","family":"Rieger","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]},{"given":"Ulrich","family":"Buehler","sequence":"additional","affiliation":[{"name":"Fulda University of Applied Sciences,Department of Applied Computer Science,Germany"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346912"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932438"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410282"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-012-9230-8"},{"article-title":"CIMD - Collaborative Intrusion and Malware Detection","year":"2008","author":"bye","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87353-2_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2003.1231412"},{"key":"ref16","article-title":"When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions","author":"dash","year":"2006","journal-title":"AAAI National Conference on Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495971"},{"key":"ref18","article-title":"Global Intrusion Detection in the DOMINO Overlay System","author":"yegneswaran","year":"2004","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2708693"},{"journal-title":"The CAIDA DDoS Attack 2007 Dataset","year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"journal-title":"The Caida Anonymized 2008 Internet Traces","year":"2021","key":"ref27"},{"key":"ref3","article-title":"Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures","author":"bye","year":"2010","journal-title":"CollSec"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004372"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref8","article-title":"EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances","author":"porras","year":"1997","journal-title":"National Information Systems Security Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2003.1226839"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"ref9","article-title":"HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification","author":"zhang","year":"2001","journal-title":"IEEE Workshop on Information Assurance and Security"},{"key":"ref1","article-title":"Collaborative Intrusion Detection Networks and Insider Attacks","author":"fung","year":"2011","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref20","article-title":"A Trust- Aware, P2P-Based Overlay for Intrusion Detection","author":"duma","year":"2006","journal-title":"12th International Workshop on Database and Expert Systems Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.180"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45474-8_4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45474-8_6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"}],"event":{"name":"2021 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2021,10,4]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2021,10,6]]}},"container-title":["2021 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9705016\/9705017\/09705027.pdf?arnumber=9705027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:21:41Z","timestamp":1654546901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9705027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cns53000.2021.9705027","relation":{},"subject":[],"published":{"date-parts":[[2021,10,4]]}}}