{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:22Z","timestamp":1730248642926,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750267","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"570-575","source":"Crossref","is-referenced-by-count":0,"title":["Reinforcing network security by converting massive data flow to continuous connections for IDS"],"prefix":"10.1109","author":[{"given":"Maher","family":"Salem","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Buehler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"329","article-title":"Integrating intrusion detection and network management","author":"qin","year":"2002","journal-title":"Symp IEEE\/iFiP NOMS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"18","first-page":"257","article-title":"The network management design integrated with the intrusion detection system","volume":"1","author":"zhang","year":"2004","journal-title":"Proc IEEE 1CMLC"},{"key":"33","first-page":"1331","article-title":"The growing hierarchical selforganizing map exploratory analysis of high-dimensional data","volume":"13","author":"rauber","year":"2002","journal-title":"IEEE Trans TNNLS"},{"journal-title":"The Third International Knowledge Discovery and Data Mining Tools Competition Dataset","year":"1999","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3675-2_25"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"journal-title":"Massachusetts Institute of technology Lincoln Laboratory","year":"1998","key":"14"},{"key":"11","first-page":"533","article-title":"VPFRING towards wire-speed network monitoring using virtual machines","author":"cardigliano","year":"2011","journal-title":"Proc of ACM SIGMETRICS\/ACM SiGCOMM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2020976.1958797"},{"key":"21","first-page":"309","article-title":"Information extraction for offline traffic anomaly detection in nIDS","volume":"8","author":"prasad","year":"2008","journal-title":"International Journal IJCSNS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/GMC.2010.5634570"},{"key":"22","first-page":"352","article-title":"Improved feature selection method using sBS-IG-Plus","author":"salem","year":"2011","journal-title":"Proc ISSSE"},{"key":"23","first-page":"229","article-title":"SNORT-Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of USENIX'99"},{"journal-title":"Snort Network Intrusion Prevention and Detection System","year":"2013","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.27"},{"key":"26","article-title":"A finite state machine model of tCP connections in the transport layer","author":"treurniet","year":"2003","journal-title":"Ottawa Defence R&D Canada"},{"journal-title":"Transmission control protocol","year":"1981","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.198"},{"key":"29","first-page":"167","article-title":"Growing hierarchical self-Organizing map for filtering intrusion detection alarms","author":"shebab","year":"2008","journal-title":"IEEE ISPAN"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.24"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.99"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195694"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.36"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560165"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"6","first-page":"171","article-title":"Service-independent payload analysis to improve intrusion detection in network traffic","author":"perona","year":"2008","journal-title":"Proc of AusDM07"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/2180868.2180871"},{"journal-title":"GureKddcup Database Description 2009","year":"2013","author":"perona","key":"5"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"9","first-page":"2526","article-title":"Origin-destination flow measurement in high-speed networks","author":"li","year":"2012","journal-title":"Froc IEEE INFOCOM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750267.pdf?arnumber=6750267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:11:47Z","timestamp":1490307107000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750267","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}