{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:55:45Z","timestamp":1729641345117,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757462","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T16:03:38Z","timestamp":1232467418000},"page":"37-44","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly-based intrusion detection using distributed intelligent systems"],"prefix":"10.1109","author":[{"given":"Benoit","family":"Morel","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"250","article-title":"a simple method to reach detection consensus in massively distributed sensor networks","author":"hong","year":"2004","journal-title":"Proc ISIT 2004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1974.5408535"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.52.4691"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(67)90051-3"},{"year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1137\/0150098"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"year":"0","key":"10"},{"key":"7","first-page":"28","article-title":"experiments on cots diversity as an intrusion detection and tolerance mechanism","author":"majorczyk","year":"2007","journal-title":"Workshop on Recent Advances on Intrusion-Tolerant Systems WRITS"},{"key":"6","first-page":"43","volume":"3858","author":"totel","year":"2006","journal-title":"COTS diversity based intrusion detection and Application to Web servers Recent Advances in Intrusion Detection (RAID)"},{"article-title":"intrusion detection, a bibliography","year":"2001","author":"me","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"journal-title":"Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection RAID","year":"2006","author":"pietraszek","key":"8"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","start":{"date-parts":[[2008,10,28]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757462.pdf?arnumber=4757462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:56:47Z","timestamp":1497787007000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757462","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}