{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:30Z","timestamp":1759132050423,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275903","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1945-1951","source":"Crossref","is-referenced-by-count":2,"title":["Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction"],"prefix":"10.1109","author":[{"given":"Manuel Gil","family":"Perez","sequence":"first","affiliation":[]},{"given":"Felix","family":"Gomez Marmol","sequence":"additional","affiliation":[]},{"given":"Gregorio","family":"Martinez Perez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.08.026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-012-9230-8"},{"key":"ref12","article-title":"Design and management of collaborative intrusion detection networks","author":"fung","year":"2013","journal-title":"University of Waterloo"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2006.21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/209436"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9176-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.050311.100028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.012"},{"key":"ref19","article-title":"The intrusion detection message exchange format (IDMEF)","author":"debar","year":"2007","journal-title":"IETF RFC 4765"},{"key":"ref4","first-page":"857","article-title":"Heterogeneous self-organizing network for access and backhaul","volume":"14","author":"agarwal","year":"2014","journal-title":"US Patent App"},{"article-title":"Taking down botnets: Public and private efforts to disrupt and dismantle cybercriminal networks","year":"2014","author":"demarest","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2003.1231412"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.007"},{"key":"ref1","article-title":"Modeling the effects of cyber operations on kinetic battles","author":"yildiz","year":"2014","journal-title":"Naval Postgraduate School"},{"key":"ref9","first-page":"240","article-title":"Agent-based distributed intrusion alert system","author":"ghosh","year":"2004","journal-title":"6th Int Workshop on Distributed Computing"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275903.pdf?arnumber=7275903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:13:21Z","timestamp":1490379201000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275903","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}