{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:23:37Z","timestamp":1729614217795,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1109\/icdim.2009.5356772","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T13:27:01Z","timestamp":1261661221000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["IFS &amp;#x2014; Intrusion forecasting system based on collaborative architecture"],"prefix":"10.1109","author":[{"given":"Elvis","family":"Pontes","sequence":"first","affiliation":[]},{"given":"Adilson E.","family":"Guelfi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2006.05.005","article-title":"Profiling program behavior for anomaly i based on the transition and frequency property of computer audit data","author":"wong","year":"2006","journal-title":"Elsevier Computers and Security J"},{"key":"17","article-title":"Time series modeling for IDS alert management","author":"viinikka","year":"2006","journal-title":"ACM ASIAN ACM Symposium on Information Computer and Communications Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2005.1517323"},{"key":"15","article-title":"IFTS: Intrusion forecast and traceback based on union defense environment","author":"leu","year":"2005","journal-title":"IEEE ICPADS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.107"},{"key":"13","article-title":"Design of on-line intrusion forecast system with a weather forecasting model","author":"chung","year":"2006","journal-title":"Springer ICCSA"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INES.2007.4283671"},{"key":"11","first-page":"9","article-title":"Quickprop neural network ensemble forecasting framework for database intrusion prediction system","author":"ramasubramanian","year":"2004","journal-title":"Proc Springer 7th ICAISC"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378401"},{"journal-title":"Identifying and modeling unwanted traffic on the internet","year":"2005","author":"soto","key":"21"},{"key":"20","first-page":"91","article-title":"Tra?fego internet na?o desejado: Conceitos, caracterizac?a?o e soluc?o?es","author":"feitosa","year":"2008","journal-title":"Proc VIII SBSeg SBC"},{"key":"22","article-title":"Report from the IAB workshop on unwanted traffic March 9-10, 2006","volume":"2006","author":"andersson","year":"2007","journal-title":"RFC 4948 IETF"},{"journal-title":"2008 Internet Crime Report","year":"0","key":"23"},{"journal-title":"Worldwide Infrastructure Sec Report","year":"2008","author":"mcpherson","key":"24"},{"journal-title":"DARPA","year":"1998","key":"25"},{"journal-title":"KDD Cup l999","year":"0","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2307\/1266443"},{"journal-title":"NIST\/SEMATECH e-Handbook of Statistical Methods","year":"2008","key":"28"},{"key":"29","article-title":"Principles of forecasting: A handbook for researchers and practitioners","author":"armstrong","year":"2002","journal-title":"Springer US"},{"key":"3","first-page":"253","article-title":"Ana?lise de tende?ncias futuras para eventos de seguranca da informac?a?o em sistemas de detecc?a?o de intrusa?o","author":"pontes","year":"2008","journal-title":"Proc VIIISBSEG SBC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2008.30"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2006.4289880"},{"journal-title":"Guide to intrusion detection and prevention systems (IDPS)","year":"2007","key":"1"},{"key":"30","article-title":"Impending earthquakes have been sending us warning signals-and people are starting to listen","author":"bleier","year":"2005","journal-title":"IEEE Spectrum"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425547"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.805796"},{"journal-title":"The Behavior of Markets A Fractal View of Risk Ruin and Reward","year":"2006","author":"mandelbrot","key":"32"},{"key":"5","first-page":"266","article-title":"Probabilistic techniques for intrusion detection based on computer audit data","author":"ye","year":"2001","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2007.4394965"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2009.5349043"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2006.1684901"},{"key":"8","first-page":"4370","article-title":"A new intrusion detection method based on behavioral model","author":"yin","year":"2004","journal-title":"IEEE WCICA"}],"event":{"name":"2009 Fourth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2009,11,1]]},"location":"Ann Arbor, MI, USA","end":{"date-parts":[[2009,11,4]]}},"container-title":["2009 Fourth International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5351158\/5356756\/05356772.pdf?arnumber=5356772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:13:10Z","timestamp":1497827590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5356772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icdim.2009.5356772","relation":{},"subject":[],"published":{"date-parts":[[2009,11]]}}}