{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T14:19:35Z","timestamp":1772201975693,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/idaacs.2017.8095094","type":"proceedings-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T16:36:46Z","timestamp":1509986206000},"page":"300-305","source":"Crossref","is-referenced-by-count":4,"title":["Combining Network Access Control (NAC) and SIEM functionality based on open source"],"prefix":"10.1109","author":[{"given":"Kai-Oliver","family":"Detken","sequence":"first","affiliation":[]},{"given":"Marcel","family":"Jahnke","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Kleiner","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Rohde","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"EsperTech"},{"key":"ref11","year":"0","journal-title":"Drools Fusion"},{"key":"ref12","year":"0","journal-title":"Apache Cassandra Database"},{"key":"ref13","year":"0","journal-title":"Apache Solr"},{"key":"ref14","year":"0","journal-title":"Bro"},{"key":"ref15","year":"0","journal-title":"RabbitMQ"},{"key":"ref16","first-page":"10","author":"kavanagh","year":"2016","journal-title":"Magic Quadrant for Security Information and Event Management"},{"key":"ref17","year":"0","journal-title":"AlienVault"},{"key":"ref18","first-page":"12","article-title":"Open-Source-SIEM im Eigenbau","author":"mahrenholz","year":"0","journal-title":"syssec"},{"key":"ref19","first-page":"92","article-title":"TCG Trusted Network Communications: TNC IF-MAP Binding for SOAP","year":"2014","journal-title":"TCG"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4765"},{"key":"ref3","year":"0","journal-title":"Federal Ministry for Economic Affairs and Energy"},{"key":"ref6","article-title":"CBOR: RFC 7049 Concise Binary Object Representation","year":"2013","journal-title":"IETF standard"},{"key":"ref5","article-title":"Francais: Schema du format IDMEF","year":"2017","journal-title":"Wikipedia license Creatice Commons Attribution-Share Alike 4 0 International"},{"key":"ref8","year":"0","journal-title":"Apache Storm Framework"},{"key":"ref7","year":"0","journal-title":"Protocol Buffers"},{"key":"ref2","year":"0","journal-title":"Project CLEAR"},{"key":"ref9","year":"0","journal-title":"Simple Event Correlator (SEC)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340752"},{"key":"ref20","first-page":"425","author":"marz","year":"2015","journal-title":"Big Data Principles and Best Practices of Scalable Realtime Data Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2675743.2771829"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488257"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.76"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2015.12"},{"key":"ref26","first-page":"224","author":"pietraszek","year":"2006","journal-title":"Alert Classification to Reduce False Positives in Intrusion Detection"},{"key":"ref25","article-title":"A framework for event prioritization","author":"kim","year":"2014","journal-title":"Cyber Network Defense"}],"event":{"name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Bucharest","start":{"date-parts":[[2017,9,21]]},"end":{"date-parts":[[2017,9,23]]}},"container-title":["2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8086093\/8094488\/08095094.pdf?arnumber=8095094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:09:30Z","timestamp":1513177770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2017.8095094","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}