{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:14:44Z","timestamp":1729646084494,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzz.2003.1206608","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T19:24:01Z","timestamp":1075836241000},"page":"1237-1242","source":"Crossref","is-referenced-by-count":8,"title":["Fuzzy logic on decision model for IDS"],"prefix":"10.1109","volume":"2","author":[{"given":"A.","family":"Orfila","sequence":"first","affiliation":[]},{"given":"J.","family":"Carbo","sequence":"additional","affiliation":[]},{"given":"A.","family":"Ribagorda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Fuzzy control","year":"2000","author":"farinwata","key":"ref10"},{"key":"ref11","first-page":"1398","article-title":"Fuzzy reasoning for mul-tisensor management","author":"molina","year":"1995","journal-title":"IEEE International Conference on Systems Man and Cybernetics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref13","article-title":"Toward cost-sensitive modeling for intrusion detection and response","volume":"10","author":"wenke","year":"2002","journal-title":"Journal of Computer Security"},{"key":"ref14","first-page":"12","article-title":"Evaluating intrusion detection systems: The 1988 DARPA off-line intrusion detection evaluation","author":"lippmann","year":"2000","journal-title":"Proceedings of the on DARPA In-fonnation Survivability Conference and Exposition (DISCEX'00) Hilton Head South carolina Jan 25&#x2013;27)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/3-540-39945-3_11","article-title":"Analysis and results of the 1999 DARPA off-Line intrusion detection evaluation","volume":"1907","author":"lippmann","year":"2000","journal-title":"in Recent Advances in Intrusion Detection Third International Workshop RAID 2000 Toulouse France October 2000 Proceedings"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref4","article-title":"Survey of common verification methods in meteorology","author":"stanski","year":"0","journal-title":"World Weather Report No S World Meteorological Organization"},{"article-title":"Network Intrusion Detection An Analyst's Handbook","year":"2001","author":"northcutt","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0450(1973)012<0595:ANVPOT>2.0.CO;2"},{"key":"ref5","article-title":"A probability and decision-model analysis of PROVOST seasonal ensemble integrations","author":"palmer","year":"1998","journal-title":"Research Department"},{"key":"ref8","first-page":"22","article-title":"A fuzzy model of reputation in agent-mediated electronic commerce","author":"carbo","year":"2001","journal-title":"Advances in Fuzzy Systems and Evolutionary Computation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511608278.007"},{"article-title":"Justifying the expense of IDS, part one: an overview of ROIs for IDS","year":"2002","author":"kinn","key":"ref2"},{"key":"ref1","article-title":"Intrusion detection systems: a survey and taxonomy","author":"axelsson","year":"2000","journal-title":"Department of Computer Engineering Chalmers University of Technology"},{"key":"ref9","first-page":"1","article-title":"The real contribution of fuzzy systems","author":"duboi","year":"1998","journal-title":"Fuzzy Systems Kluwer Academic Publishers eds"}],"event":{"name":"12th International Fuzzy Systems Conference","acronym":"FUZZY-03","location":"St Louis, MO, USA"},"container-title":["The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8573\/27148\/01206608.pdf?arnumber=1206608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T16:15:24Z","timestamp":1585498524000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206608\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/fuzz.2003.1206608","relation":{},"subject":[]}}