{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:50:05Z","timestamp":1766065805528,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/ijcnn.2008.4634307","type":"proceedings-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T20:31:26Z","timestamp":1222720286000},"page":"3564-3570","source":"Crossref","is-referenced-by-count":6,"title":["IDS alarms reduction using data mining"],"prefix":"10.1109","author":[{"given":"Safaa O.","family":"Al-Mamory","sequence":"first","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ayad R.","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"229","article-title":"snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 1999 USENIX LISA Conference"},{"key":"18","first-page":"547","article-title":"knowledge discovery in databases: an attribute-oriented approach","author":"han","year":"1992","journal-title":"Proc 18th international conference on Very Large Databases"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.23"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"13","first-page":"399421","article-title":"exploration of the power of attribute-oriented induction in data mining","author":"han","year":"1996","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/69.204089"},{"key":"11","first-page":"231","article-title":"fusing a heterogeneous alert stream into scenarios","author":"dain","year":"2001","journal-title":"Proc 2001 ACM Workshop on Data Mining for Security Applications"},{"key":"12","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","article-title":"using adaptive alert classification to reduce false positives in intrusion detection","author":"pietraszek","year":"2004","journal-title":"Proc Recent advances in intrusion detection (RAID2004)"},{"key":"3","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.aei.2005.05.004","article-title":"trinetr: an architecture for collaborative intrusion detection and knowledge-based alert evaluation","volume":"19","author":"jinqiao","year":"2005","journal-title":"Advanced Engineering Informatics"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00138-9"},{"key":"10","first-page":"54","article-title":"probabilistic alert correlation","volume":"2212","author":"valdes","year":"2001","journal-title":"LNCS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775101"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991517"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2005.1548632"},{"key":"4","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.engappai.2006.01.003","article-title":"alarm clustering for intrusion detection systems in computer networks","volume":"19","author":"perdisci","year":"2006","journal-title":"Engineering Applications of Artificial Intelligence"},{"article-title":"using root cause analysis to handle intrusion detection alarms","year":"2003","author":"julisch","key":"9"},{"key":"8","article-title":"dealing with false positives in intrusion detection","author":"julisch","year":"2000","journal-title":"Proc 3rd Workshop on Recent Advances in Intrusion Detection"}],"event":{"name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong","end":{"date-parts":[[2008,6,8]]}},"container-title":["2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625775\/4633757\/04634307.pdf?arnumber=4634307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T01:10:11Z","timestamp":1590801011000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4634307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2008.4634307","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}