{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:36:11Z","timestamp":1725510971031},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503227","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T23:29:23Z","timestamp":1367018963000},"page":"898-903","source":"Crossref","is-referenced-by-count":4,"title":["Embedded Markov process based model for performance analysis of Intrusion Detection and Prevention Systems"],"prefix":"10.1109","author":[{"given":"Khalid","family":"Alsubhi","sequence":"first","affiliation":[]},{"given":"Mohamed Faten","family":"Zhani","sequence":"additional","affiliation":[]},{"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Matrix-geometric Solutions in Stochastic Models An Algorith- Mic Approach","year":"1981","author":"neuts","key":"19"},{"journal-title":"Matlab","year":"2011","key":"22"},{"journal-title":"Queueing Analysis","year":"1991","author":"takagi","key":"17"},{"journal-title":"Simulation Techniques for Discrete Event Systems","year":"1982","author":"mitrani","key":"23"},{"journal-title":"Queueing Systems Volume 1 Theory","year":"1975","author":"kleinrock","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1428609"},{"key":"16","first-page":"244","author":"gross","year":"1998","journal-title":"Fundamentals of Queueing Theory"},{"key":"13","article-title":"Intelligent distribution ofintrusion prevention services on programmable routers","author":"hess","year":"2006","journal-title":"Proc of IEEE INFOCOM"},{"key":"14","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA '99 Proceedings of the 13th USENIX conference on System administration"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03644-6_15","article-title":"A hybrid parallel signature matching model for network security applications using simd GPU","author":"wu","year":"2009","journal-title":"Advanced Parallel Processing Technologies"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_14","article-title":"Performance adaptation in real-time intrusion detection systems","author":"lee","year":"2002","journal-title":"Recent Advances in Intrusion Detection"},{"key":"21","first-page":"159","article-title":"Fast packet classification for snort by native compilation of rules","author":"tongaonkar","year":"2008","journal-title":"Proceedings of the Con- Ference on Large Installation System Administration Conference (LISA)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00310-9"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"1","first-page":"800","article-title":"Guide to intrusion detection and prevention systems(idps)","author":"scarfone","year":"2007","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"10","article-title":"Design alternatives for a high-performance selfsecuring ethernet network interface","author":"schuff","year":"2007","journal-title":"IEEE International Parallel and Distributed Processing Symposium IPDPS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.122011.110151"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990713"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45248-5_9","article-title":"Characterizing the performance of network intrusion detection sensors","author":"schaelicke","year":"2003","journal-title":"Int Symp Recent Advances in Intrusion Detection"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090403"},{"key":"9","article-title":"Operational experiences with high-volume network intrusion detection","author":"dreger","year":"2004","journal-title":"Proc 10th ACM CCS"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-87403-4_8","article-title":"Predicting the resource consumption of network intrusion detection systems","author":"dreger","year":"2008","journal-title":"Recent Advances in Intrusion Detection"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","start":{"date-parts":[[2012,12,3]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503227.pdf?arnumber=6503227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:04:20Z","timestamp":1498046660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6503227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503227","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}