{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:11:06Z","timestamp":1729671066794,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/cscwd.2007.4281552","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T15:59:31Z","timestamp":1186588771000},"page":"876-881","source":"Crossref","is-referenced-by-count":3,"title":["Cooperative intrusion detection model based on scenario"],"prefix":"10.1109","author":[{"given":"Shaohua","family":"Teng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiufen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Wenwei","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"167","article-title":"Distributed Intrusion Detection System Based on D-S Evidence Reasoning","volume":"13","author":"yong","year":"2004","journal-title":"Computer Engineering and Applications"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"forrest","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref12","first-page":"144","article-title":"A fast automaton-based method for detecting anomalous program behaviors","author":"bendre","year":"2001","journal-title":"Proc IEEE Symp Security and Privacy (S&P"},{"key":"ref13","first-page":"311","article-title":"A scan attack detection model by combining feature and statistic analysis","volume":"1","author":"teng","year":"2004","journal-title":"Information and Computer Science"},{"article-title":"Network intrusion detection: an analyst's handbook","year":"1999","author":"northcutt","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1996.569702"},{"key":"ref3","first-page":"136","article-title":"Construction of Intrusion Detection Modelfor Scenario-basedand State Transition Analysis","volume":"31","author":"shaohua","year":"2005","journal-title":"Computer Engineering"},{"year":"0","key":"ref6"},{"article-title":"Practical Unix & Internet security","year":"1999","author":"garfinkel","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"year":"0","key":"ref7"},{"key":"ref2","first-page":"202","article-title":"A Study on Information Exchange and Cooperation in DistributedIntrusion Detection Systems","volume":"22","author":"yifeng","year":"2005","journal-title":"Journal of the Graduate School of the Chinese Academy of Science"},{"key":"ref1","first-page":"1919","article-title":"Correlation Analysis for Distributed Intrusion Alert","volume":"41","author":"jiachun","year":"2004","journal-title":"Journal of Computer research and development"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228217"}],"event":{"name":"2007 11th International Conference on Computer Supported Cooperative Work in Design","start":{"date-parts":[[2007,4,26]]},"location":"Melbourne, Australia","end":{"date-parts":[[2007,4,28]]}},"container-title":["2007 11th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4281389\/4281390\/04281552.pdf?arnumber=4281552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T20:59:16Z","timestamp":1556744356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4281552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2007.4281552","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}