{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:59:25Z","timestamp":1729645165235,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528341","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T14:27:58Z","timestamp":1470407278000},"page":"281-284","source":"Crossref","is-referenced-by-count":0,"title":["Agent-based IDMEF alerting infrastructure for distributed intrusion detection and prevention systems: Design and validation"],"prefix":"10.1109","author":[{"given":"Radu","family":"Lupu","sequence":"first","affiliation":[]},{"given":"Radu","family":"Badea","sequence":"additional","affiliation":[]},{"given":"Ion Cosmin","family":"Mihai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Intrusion Detection System for Wide Automation Network Based on the Ethernet Compatible Communication Protocols","author":"kadlec","year":"2011","journal-title":"Proc of IARIA Int'l Conference ICONS"},{"key":"ref11","article-title":"A Hierachical Intrusion Detection System for Clouds: Design and Evaluation","volume":"2","author":"kholidy","year":"2012","journal-title":"Int'l Conference IJCCSA"},{"key":"ref12","article-title":"An Open and Secure Infrastructure for Distributed Intrusion Detection Sensors","author":"jahnke","year":"2002","journal-title":"Proc of the NATO regional Conference CIS02"},{"journal-title":"Prelude IDS web site","year":"0","key":"ref13"},{"journal-title":"LibXML web site","year":"0","key":"ref14"},{"journal-title":"Libliteidmef source code on GitHub","year":"0","key":"ref15"},{"journal-title":"French National Project (work in progress)","article-title":"Web site of &#x201C;SECEF-Security Exchange Format","year":"2014","key":"ref4"},{"key":"ref3","article-title":"CIMD-Collaborative Intrusion and Malware Detection","author":"bye","year":"2008","journal-title":"Tech Report TUB-DAI 08\/08-01"},{"journal-title":"ArcSight","article-title":"CEF-Common Event Format","year":"0","key":"ref6"},{"journal-title":"MITRE Corporation","article-title":"CEE-Common Event Expression","year":"0","key":"ref5"},{"journal-title":"Distributed Management Task Force","article-title":"CIM-Common Information Model","year":"0","key":"ref8"},{"journal-title":"IBM Partner Worl Program and Ready for IBM Security Intelligence Program","article-title":"IBM Security QRadar Log Event Extended Format Guide (LEEF 1.0)","year":"0","key":"ref7"},{"key":"ref2","article-title":"Intrusion Detection Message Exchange Requirements","volume":"4766","author":"wood","year":"2007","journal-title":"RFC"},{"key":"ref1","article-title":"The Intrusion Detection Message Exchange Format(IDMEF)","author":"debar","year":"2007","journal-title":"RFC 4765(Experimental Status) IETF"},{"journal-title":"Cisco Web-pages","article-title":"Cisco Intrusion Detection Event Exchange(CIDEE) Specification","year":"0","key":"ref9"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528341.pdf?arnumber=7528341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T21:51:23Z","timestamp":1474840283000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528341","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}