{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:22:57Z","timestamp":1730265777265,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/ijcnn.2008.4633994","type":"proceedings-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T20:31:26Z","timestamp":1222720286000},"page":"1495-1502","source":"Crossref","is-referenced-by-count":1,"title":["Modeling network attacks for scenario construction"],"prefix":"10.1109","author":[{"given":"Safaa O.","family":"Al-Mamory","sequence":"first","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ayad R.","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","volume":"5","author":"mogensen","year":"2007","journal-title":"Basics of Compiler Design"},{"journal-title":"RealSecure signatures reference guide","year":"0","key":"17"},{"key":"18","first-page":"163","article-title":"attack languages","author":"vigna","year":"2000","journal-title":"Proc IEEE Information Survivability Workshop (ISW'00)"},{"journal-title":"RealSecure intrusion detection system","year":"0","key":"15"},{"journal-title":"Sourceflre Snort signature database","year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2007.200"},{"key":"14","first-page":"229","article-title":"snort-lightweight intrusion, detection for networks","author":"roesch","year":"1999","journal-title":"Proc 1999 USENIXUSA Conference"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.11"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/AICT-ICIW.2006.52"},{"journal-title":"DARPA intrusion detection scenario specific dataseis","year":"2000","key":"20"},{"journal-title":"TIAA A toolkit for intrusion alert analysis","year":"0","author":"ning","key":"22"},{"journal-title":"f-defcon8","year":"0","key":"23"},{"journal-title":"Graphviz-open source graph layout and drawing software","year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.04.001"},{"journal-title":"Compilers Principles Techniques and Tools","year":"1986","author":"aho","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996947"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2005.05.004"},{"key":"7","first-page":"54","article-title":"probabilistic alert correlation","volume":"2212","author":"valdes","year":"2001","journal-title":"LNCS"},{"key":"6","first-page":"591","article-title":"statistical causality analysis of infosec alert data","author":"qin","year":"2003","journal-title":"Proc 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003)"},{"key":"5","first-page":"231","article-title":"fusing a heterogeneous alert stream into scenarios","author":"dain","year":"2001","journal-title":"Proc 2001 ACM Workshop on Data Mining for Security Applications"},{"key":"4","first-page":"97","article-title":"building attack scenarios through integration of complementary alert correlation methods","author":"ning","year":"2004","journal-title":"Proc 11th Annu Network and Distributed System Security (NDSS'04)"},{"key":"9","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-36084-0_7","article-title":"m2d2: a formal data model for ids alert correlation","author":"morin","year":"2002","journal-title":"Proc Recent Advances in Intrusion Detection"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"}],"event":{"name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong","end":{"date-parts":[[2008,6,8]]}},"container-title":["2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625775\/4633757\/04633994.pdf?arnumber=4633994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T01:10:08Z","timestamp":1590801008000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4633994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2008.4633994","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}