{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:38:05Z","timestamp":1730248685741,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icitst.2015.7412127","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:35:10Z","timestamp":1456486510000},"page":"384-390","source":"Crossref","is-referenced-by-count":0,"title":["Predicting multi-stage attacks based on IP information"],"prefix":"10.1109","author":[{"given":"Abdulrazaq","family":"Almutairi","sequence":"first","affiliation":[]},{"given":"David","family":"Parish","sequence":"additional","affiliation":[]},{"given":"James","family":"Flint","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Mcafee. Operation Shady Rat _ What It Really Means, and What You Can Learn From It?"},{"year":"2015","key":"ref11","article-title":"Neutrino (2015) Web Services [IP Check Web Services]"},{"year":"2015","key":"ref12","article-title":"Fraudd Lab (2015) Web Services [IP Check Web Services]"},{"year":"2015","key":"ref13","article-title":"Mathworks. ((What In Mamdani-Type Fuzzy Inference?"},{"key":"ref14","article-title":"A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems","author":"finx","year":"2002","journal-title":"Information TransferTechnology Group"},{"year":"0","key":"ref15","article-title":"Sans (2015) Block Listted IP Addresses [List of IP addresses)"},{"key":"ref16","first-page":"301","article-title":"(2009): &#x201C;Multi- Tier Evaluation of Network Intrusion Detection Systems","volume":"5","author":"lserhan","year":"0","journal-title":"Journal of Information Assurance and Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"key":"ref18","article-title":"Applications of hidden markov models to detecting multistage network attacks","author":"ourston","year":"2003","journal-title":"Proceedings of the 36th Hawaii International Conference on Systems Sciences Los Alamitos CA USA 2003 2003 IEEE Comput Soc 36th Hawaii International Conference on Systems Sciences"},{"key":"ref4","article-title":"Neural Networks, Fuzzy ILogic and Genetic Algorithm: Synthesis and Applications","author":"rajasekaran","year":"2003","journal-title":"PHI Learning Pvt Ltd"},{"article-title":"(2011) Operation Shady Rat _ What It Really Means, and What You Can Learn From It?","year":"2015","author":"global","key":"ref3"},{"article-title":"Fuzzy Logic vs Machine Learning","year":"0","author":"pulo","key":"ref6"},{"article-title":"Fuzzy Logic Controllers. Methodology. Advantages and Drawbacks","year":"0","author":"alberto","key":"ref5"},{"article-title":"2011 Countering Web Injection Attacks: A Proof of Concept","year":"0","author":"hall","key":"ref8"},{"key":"ref7","article-title":"prehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model","volume":"1","author":"chitrey","year":"2012","journal-title":"IJINS13"},{"article-title":"A Novel Intrusion Detection System (IDS) Architecture","year":"2010","author":"muila","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1921233.1921247"},{"year":"2015","key":"ref9","article-title":"TP Group, Network Trace Files"}],"event":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2015,12,14]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7400833\/7412034\/07412127.pdf?arnumber=7412127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:01:33Z","timestamp":1490086893000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7412127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icitst.2015.7412127","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}