{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:44:23Z","timestamp":1749847463704,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/css.2011.6058565","type":"proceedings-article","created":{"date-parts":[[2011,10,24]],"date-time":"2011-10-24T16:30:29Z","timestamp":1319473829000},"page":"15-20","source":"Crossref","is-referenced-by-count":18,"title":["Identification of correlated network intrusion alerts"],"prefix":"10.1109","author":[{"given":"Mirco","family":"Marchetti","sequence":"first","affiliation":[]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Manganiello","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Capture the Flag Traffic Dump","year":"0","key":"ref4"},{"journal-title":"Snort Home Page","year":"0","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"ref6","first-page":"258","article-title":"Network intrusion detection using na&#x00EF;ve bayes","volume":"7","author":"panda","year":"2007","journal-title":"International Journal on Computer Science and Network Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.124"},{"key":"ref5","article-title":"Adaptive, model-based monitoring for cyber attack detection","author":"valdes","year":"2000","journal-title":"recent Advances in Intrusion Detection Third International Workshop RAID 2000"},{"journal-title":"Solution of equation 10 obtained through the computational engine wolfram alpha","year":"0","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.259.265"},{"key":"ref7","article-title":"Active platform security through intrusion detection using naive bayesian network for anomaly detection","author":"sebyala","year":"2002","journal-title":"Proc of the London Communications Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.213"},{"key":"ref9","article-title":"Network intrusion detection based on bayesian networks","author":"cemerlic","year":"2008","journal-title":"Proc of the 20th International Conference on Software Engineering and Knowledge Engineering (SEKE'08)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"}],"event":{"name":"2011 International Workshop on Cyberspace Safety and Security (CSS)","start":{"date-parts":[[2011,9,8]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 Third International Workshop on Cyberspace Safety and Security (CSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044610\/6058554\/06058565.pdf?arnumber=6058565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:17:49Z","timestamp":1490095069000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6058565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/css.2011.6058565","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}