{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T12:04:32Z","timestamp":1744977872702,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/ecai.2016.7861119","type":"proceedings-article","created":{"date-parts":[[2017,2,24]],"date-time":"2017-02-24T00:39:14Z","timestamp":1487896754000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["IDS rule management made easy"],"prefix":"10.1109","author":[{"given":"Zeeshan","family":"Afzal","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Lindskog","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Fun w th packets Des gn ng a st ck","year":"2002","author":"coetez","key":"ref10"},{"key":"ref11","first-page":"200","article-title":"An ach es hee n s gnatu e based IDS Squea ng fa se pos t ves n Sno t","author":"patton","year":"0","journal-title":"Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref12","first-page":"374","article-title":"An expe ence deve op ng an IDS st mu ato fo the b ack box test ng of netwo k nt us on detect on systems","author":"mutz","year":"2003","journal-title":"Proceedings of the 19th Annual ComputerSecurity Applications Conference (ACSAC)"},{"article-title":"Rule2alert: On-the-fiy packet generation based off snort u es","year":"2009","author":"crespo","key":"ref13"},{"key":"ref14","first-page":"204","article-title":"Ru e2a e t","author":"manev","year":"0"},{"journal-title":"A achn ds event s gnatu es expo t fo sno t","article-title":"Advanced Refe ence A ch ve of Cu ent Heu st cs fo Netwo k In t us on Detect on Systems","year":"2000","key":"ref15"},{"key":"ref16","article-title":"S gnatu e detect on n samp ed packets","author":"m\u00fcnz","year":"2007","journal-title":"Proc of IEEE\/IST Workshop on Monitoring Attack Detection and Mitigation (MonAM 2006)"},{"first-page":"206","article-title":"Snort official website","year":"0","key":"ref17"},{"first-page":"204","article-title":"Use s manua 2 9 7","year":"0","key":"ref18"},{"key":"ref19","first-page":"265","article-title":"Mu t path TCP IDS evas on and m t gat on","volume":"205","author":"afza","year":"0","journal-title":"Proceedings of the 18th International Conference on Information Security (ISC)"},{"key":"ref4","article-title":"Int us on detect on systems A su vey and taxonomy","author":"axesson","year":"2000","journal-title":"Tech Rep"},{"key":"ref3","article-title":"Us ng mode based nt us on detect on fo SCADA net wo ks","author":"cheung","year":"2007","journal-title":"Proc SCADA Security Scientific Symp"},{"first-page":"206","article-title":"Su cata Open sou ce IDS\/IPS\/NSM eng ne","year":"0","key":"ref6"},{"key":"ref5","first-page":"229","article-title":"Sno t L ghtwe ght nt us on detect on fo netwo ks","author":"roesch","year":"0","journal-title":"Proc of the 13th Systems Administration Conference"},{"article-title":"An ove v ew of ssues n test ng nt us on detect on systems","year":"2003","author":"me","key":"ref8"},{"key":"ref7","first-page":"36370","article-title":"Automat c eva uat on of nt us on detect on systems","author":"masscotte","year":"2006","journal-title":"Proceedings of the 22nd Annual ComputerSecurity Applications Conference (ACSAC)"},{"key":"ref2","first-page":"200","article-title":"Detect on, co e at on, and v sua zat on of attacks aga nst c t ca nf ast uctu e systems","author":"besemeste","year":"0","journal-title":"Proc 8th Conf Privacy Security and Trust"},{"key":"ref9","first-page":"205","article-title":"Automated test ng of IDS u es","author":"afza","year":"0","journal-title":"Proceedings of the 8th IEEE International Conference on Software Testing Verification and Validation (ICST) Workshops"},{"key":"ref1","first-page":"205","article-title":"Cha enges fo IDS\/IPS dep oyment n ndust a cont o systems","author":"hokan","year":"0"},{"journal-title":"TCP extens ons fo mu t path ope at on w th mu t p e add esses","year":"0","author":"fod","key":"ref20"},{"first-page":"204","article-title":"http se ve","year":"0","key":"ref22"},{"key":"ref21","article-title":"Scapy Exp o e the net w th new eyes","author":"bond","year":"2005","journal-title":"Tech Rep"},{"key":"ref24","first-page":"205","article-title":"Sno t b og","author":"ese","year":"0"},{"first-page":"206","article-title":"Why a e u es commented out by defau t?","year":"0","key":"ref23"},{"key":"ref25","article-title":"Co e A ea t me netwo k emu ato","author":"ahenhoz","year":"2008","journal-title":"Proceedings of the IEEE Military Communications Conference (MILCOM)"}],"event":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2016,6,30]]},"location":"Ploiesti, Romania","end":{"date-parts":[[2016,7,2]]}},"container-title":["2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7843798\/7861062\/07861119.pdf?arnumber=7861119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T20:43:44Z","timestamp":1629319424000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7861119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ecai.2016.7861119","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}