{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T03:16:55Z","timestamp":1725419815738},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icsmc.2007.4413743","type":"proceedings-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T13:19:35Z","timestamp":1216387175000},"page":"326-331","source":"Crossref","is-referenced-by-count":0,"title":["Effective event description using trend template language and efficient intrusion detection"],"prefix":"10.1109","author":[{"family":"Ahsan Habib","sequence":"first","affiliation":[]},{"family":"Phan Minh Dung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Assessment of the DARPA IDS Evaluation Dataset Using Snort","year":"2007","author":"brugger","key":"13"},{"key":"11","article-title":"Temporal reasoning in medical expert systems","author":"kohane","year":"1987","journal-title":"TR 389"},{"key":"12","first-page":"170","article-title":"Temporal reasoning in medical expert systems","author":"kohane","year":"1986","journal-title":"MEDINFO 86 Proceedings of the Fifth Conference on Medical Informatics"},{"article-title":"Knowledge-Based Trend Detection and Diagnosis","year":"1994","author":"haimowitz","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"article-title":"Detectors should be characterized by likelihood ratios, not posterior probabilities","year":"2000","author":"szolovits","key":"10"},{"journal-title":"STATL An attack language for state-based intrusion detection","year":"2000","author":"eckmann","key":"7"},{"key":"6","article-title":"Attack Languages","author":"vigna","year":"0","journal-title":"Proc of the IEEE Information Survivability Workshop 2000"},{"article-title":"A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems","year":"1999","author":"kendall","key":"5"},{"year":"0","key":"4"},{"article-title":"Some representational limitations of the common intrusion specification language","year":"1999","author":"doyle","key":"9"},{"article-title":"A common intrusion specification language (CISL)","year":"2000","author":"feiertag","key":"8"}],"event":{"name":"2007 IEEE International Conference on Systems, Man and Cybernetics","start":{"date-parts":[[2007,10,7]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2007,10,10]]}},"container-title":["2007 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4413560\/4413561\/04413743.pdf?arnumber=4413743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T10:44:45Z","timestamp":1489661085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4413743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2007.4413743","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}