{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:55:28Z","timestamp":1730235328664,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icci-cc.2018.8482026","type":"proceedings-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T23:23:37Z","timestamp":1539041017000},"page":"552-560","source":"Crossref","is-referenced-by-count":1,"title":["Detecting and Resolving Inconsistencies in Snort"],"prefix":"10.1109","author":[{"given":"Xibin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Du","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingzhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhuoxin","family":"He","sequence":"additional","affiliation":[]},{"given":"Haijie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiwei","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1038\/nature12939"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-5347(01)02380-1"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1109\/TETC.2018.2812927","article-title":"A New Class Topper Optimization Algorithm with an Application to Data Clustering.","author":"das","year":"2018","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2017.07.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2017.01.004"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/35099670"},{"key":"ref36","article-title":"Handbook of the birds of Europe, the Middle East and North Africa","volume":"vi","author":"cramp","year":"1992","journal-title":"The birds of the western Palearctic"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1413589112"},{"journal-title":"Bird Migration","year":"1993","author":"alerstam","key":"ref34"},{"key":"ref10","first-page":"22","author":"guan-xia","year":"2007","journal-title":"Detecting and Ordering Optimization of Firewall Rules[C]"},{"key":"ref11","first-page":"14","author":"yu","year":"2012","journal-title":"Research and implementation of firewall rule conflict detection[C]"},{"key":"ref12","first-page":"14","author":"gui-long","year":"2014","journal-title":"Research of the key Technologies on Firewall Configuration Rules Anomalies Detection[C]"},{"key":"ref13","first-page":"523","article-title":"Detecting and resolving conflict for network intrusion rule","volume":"36","author":"mei-feng","year":"2006","journal-title":"Natural Science Edition"},{"key":"ref14","first-page":"576","article-title":"Conflict detection based on Snort rules","volume":"29","author":"wen-wei","year":"2008","journal-title":"Computer Engineering and Design"},{"key":"ref15","first-page":"54","article-title":"A Hybrid Algorithm to Solve Firewall Rule Conflict","volume":"9","author":"mei-feng","year":"2006","journal-title":"Journal of Yangzhou University (Natural Science Edition)"},{"journal-title":"Wikipedia [EB\/OL]","year":"0","key":"ref16"},{"key":"ref17","first-page":"141","article-title":"Learning through Overcoming Temporal Inconsistencies","author":"zhang","year":"2015","journal-title":"IEEE International Conference on Cognitive Informatics & Cognitive Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.07.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcde.2015.06.003"},{"key":"ref4","first-page":"1","article-title":"Detecting and Resolving Inconsistencies in Firewalls","author":"zhang","year":"2015","journal-title":"IEEE International Conference on Information Reuse and Integration"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2015.7381893"},{"key":"ref3","first-page":"32","author":"zhi-hua","year":"2016","journal-title":"Machine learning[M]"},{"key":"ref6","first-page":"185","article-title":"Using argumentation logic for firewall policy specification and analysis","author":"bandara","year":"2006","journal-title":"Proc IFIP\/IEEE Int Workshop Distributed Systems Operations and Management"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1314436.1314440"},{"journal-title":"Wikipedia [EB\/OL]","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"journal-title":"Intrusion Detection System","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.03.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.05.018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.11.026"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.03.043"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1920-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.07.006"}],"event":{"name":"2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","start":{"date-parts":[[2018,7,16]]},"location":"Berkeley, CA","end":{"date-parts":[[2018,7,18]]}},"container-title":["2018 IEEE 17th International Conference on Cognitive Informatics &amp; Cognitive Computing (ICCI*CC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8470026\/8482005\/08482026.pdf?arnumber=8482026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T10:08:59Z","timestamp":1540894139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8482026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icci-cc.2018.8482026","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}