{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T16:06:15Z","timestamp":1747411575835},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/comsnets.2012.6151339","type":"proceedings-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T10:20:00Z","timestamp":1329301200000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["IDS alerts classification using knowledge-based evaluation"],"prefix":"10.1109","author":[{"given":"Dheeraj","family":"Gupta","sequence":"first","affiliation":[]},{"given":"P.S.","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"A.K.","family":"Bhattacharjee","sequence":"additional","affiliation":[]},{"given":"R.S.","family":"Mundada","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"The Development of a Common Enumeration of Vulnerabilities and Exposures","author":"baker","year":"1999","journal-title":"8th Int Symp Recent Advances in Intrusion Detection"},{"key":"ref11","article-title":"CVSS: A common vulnerability scoring system","author":"schiffman","year":"2004","journal-title":"National Infrastructure Advisory Council"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1989.10478785"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/2319447"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2115251"},{"key":"ref15","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration"},{"journal-title":"Improving the accuracy and effectiveness of intrusion detection systems","year":"2011","author":"gupta","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","article-title":"Using adaptive alert classification to reduce false positives in intrusion detection","author":"pietraszek","year":"2004","journal-title":"8th Int Symp Recent Advances in Intrusion Detection"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.5.412"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AISIG.1989.47311"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.07.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.07.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_9"},{"key":"ref7","first-page":"1","article-title":"The base-rate fallacy and its implications for the intrusion detection","author":"axelsson","year":"1999","journal-title":"Proceedings of the 6th ACM conference on Computer and communications security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref1","article-title":"Computer Security Threat Monitoring and Surveillance","author":"anderson","year":"1980","journal-title":"James P Anderson & Co"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.76"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/21.376493"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref21","first-page":"202","article-title":"Scaling up the accuracy of naive-Bayes classifiers: A decision-tree hybrid","author":"kohavi","year":"1996","journal-title":"Proceedings of the Second International Conference on Knowledge Discovery and Data Mining"},{"key":"ref23","first-page":"345","article-title":"A probabilistic interpretation of precision, recall and F-score, with implication for evaluation","author":"goutte","year":"2005","journal-title":"Proc 27th European Conf IR Research"}],"event":{"name":"2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2012,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2012,1,7]]}},"container-title":["2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6145051\/6151271\/06151339.pdf?arnumber=6151339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T10:17:12Z","timestamp":1497953832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6151339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2012.6151339","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}