{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:24:18Z","timestamp":1743049458670,"version":"3.40.3"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,3]]},"DOI":"10.1109\/icsc63929.2024.10928892","type":"proceedings-article","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T17:56:43Z","timestamp":1742839003000},"page":"424-428","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Intrusion Detection Systems Leveraging Knowledge Graph-Based Techniques"],"prefix":"10.1109","author":[{"given":"Mohamed Amine","family":"DAOUD","sequence":"first","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,LRIAS Lab,Dept. of Computer Sciences,Algeria"}]},{"given":"Sid Ahmed Mokhtar","family":"MOSTEFAOUI","sequence":"additional","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,LRIAS Lab,Dept. of Computer Sciences,Algeria"}]},{"given":"Hadj Madani","family":"MEGHAZI","sequence":"additional","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,LRIAS Lab,Dept. of Computer Sciences,Algeria"}]},{"given":"Ourida","family":"LABBADI","sequence":"additional","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,Dept. of Computer Sciences,Algeria"}]},{"given":"Chaima","family":"Zenina","sequence":"additional","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,Dept. of Computer Sciences,Algeria"}]},{"given":"Abdelkader","family":"BOUGUESSA","sequence":"additional","affiliation":[{"name":"Ibn-Khaldoun University of Tiaret,LRIAS Lab,Dept. of Computer Sciences,Algeria"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Computer security threat monitoring and surveillance","volume-title":"Technical Report, James P. Anderson Company","author":"Anderson","year":"1980"},{"volume-title":"Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID","year":"2003","author":"Rehman","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1352\/1944-7558-126.6.439"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NTIC55069.2022.10100585"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3357613.3357626"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5232-8_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2020010103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTIC.2015.7368742"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071263"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7438"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s23020629"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3448250"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2022.102130"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90100-J"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010241"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45183-7_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.500"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzs034"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025685"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268519"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094183"},{"key":"ref29","first-page":"63","article-title":"Graph-based malicious login events investigation","volume-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"Amrouche"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4748528"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1201\/9781003033707-20"},{"volume-title":"Ne04j graph data modeling","year":"2015","author":"Lal","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0147-z"}],"event":{"name":"2024 12th International Conference on Systems and Control (ICSC)","start":{"date-parts":[[2024,11,3]]},"location":"Batna, Algeria","end":{"date-parts":[[2024,11,5]]}},"container-title":["2024 12th International Conference on Systems and Control (ICSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10928279\/10928282\/10928892.pdf?arnumber=10928892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:27:57Z","timestamp":1743035277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10928892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icsc63929.2024.10928892","relation":{},"subject":[],"published":{"date-parts":[[2024,11,3]]}}}