{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:25:52Z","timestamp":1725549952862},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icumt.2017.8255194","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:49:48Z","timestamp":1516056588000},"page":"294-298","source":"Crossref","is-referenced-by-count":0,"title":["Methodology for correlations discovery in security logs"],"prefix":"10.1109","author":[{"given":"Zdenek","family":"Martinasek","sequence":"first","affiliation":[]},{"given":"Petr","family":"Blazek","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Silhavy","sequence":"additional","affiliation":[]},{"given":"David","family":"Smekal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security architecture for the Internet protocol","year":"2005","author":"seo","key":"ref4"},{"journal-title":"Cheat Sheet","year":"2015","author":"woschek","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref6","first-page":"591","author":"velichko","year":"2014","journal-title":"Improvement of Finite Difference Method Convergence for Increasing the Efficiency of Modeling in Communications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1985.tb00159.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23418"},{"key":"ref7","first-page":"776","author":"velichko","year":"2016","journal-title":"Information Risk Analysis for Logistics Systems"},{"journal-title":"Sp 800&#x2013;92 guide to computer security log management","year":"2006","author":"kent","key":"ref2"},{"journal-title":"Internet Key Exchange Protocol Version 2 (IKEv2)","year":"2010","author":"eronen","key":"ref9"},{"journal-title":"Logging and log management The authoritative guide to understanding the concepts surrounding logging and log management","year":"2013","author":"chuvakin","key":"ref1"}],"event":{"name":"2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2017,11,6]]},"location":"Munich","end":{"date-parts":[[2017,11,8]]}},"container-title":["2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241503\/8255110\/08255194.pdf?arnumber=8255194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:08:14Z","timestamp":1519085294000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8255194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icumt.2017.8255194","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}