{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:02:39Z","timestamp":1729620159350,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/iscst.2005.1553297","type":"proceedings-article","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T17:52:37Z","timestamp":1135273957000},"page":"78-83","source":"Crossref","is-referenced-by-count":1,"title":["NIDS architecture for clusters"],"prefix":"10.1109","author":[{"given":"F.","family":"Gadaud","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","first-page":"229","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA '99 Proceedings of the 13th USENIX conference on System administration"},{"year":"1995","journal-title":"Scheduling and Load Balancing in Parallel and Distributed Systems","key":"22"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/CLUSTR.2004.1392625"},{"key":"23","first-page":"617","article-title":"An introduction to the InfiniBand architecture","author":"pfister","year":"2001","journal-title":"High Performance Mass Storage and Parallel I\/O Technologies and Applications"},{"year":"2001","author":"walker","journal-title":"OpenSSI (Single System Image) Clusters for Linux","key":"18"},{"key":"24","article-title":"Quadrics QsNet II: A network for supercomputing applications","volume":"15","author":"beecroft","year":"2003","journal-title":"Hot Chips"},{"year":"2003","author":"biondi","journal-title":"Net2pcap","key":"15"},{"key":"16","article-title":"OpenMosix approach to build scalable HPC farms with an easy management infrastructure","author":"esposito","year":"2003","journal-title":"2003 Computing in High Energy and Nuclear Physics (CHEP03)"},{"key":"13","first-page":"97","article-title":"M2D2: A formal data model for IDS alert correlation","author":"morin","year":"2002","journal-title":"Recent Advances in Intrusion Detection"},{"year":"1989","author":"jacobson","journal-title":"tcpdump","key":"14"},{"key":"11","first-page":"119","article-title":"A statistical method for profiling network traffic","author":"marchette","year":"1999","journal-title":"First USENIX Workshop on Intrusion Detection and Network Monitoring"},{"key":"12","first-page":"926","article-title":"A performance prediction framework for scientific applications","author":"carrington","year":"2003","journal-title":"International Conference on Computational Science"},{"key":"21","first-page":"141","volume":"14","author":"casavant","year":"1988","journal-title":"A Taxonomy of Scheduling in General-purpose Distributed Computing Systems"},{"key":"3","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/SECPRI.2002.1004378","article-title":"Stateful intrusion detection for high-speed networks","author":"kruegel","year":"2002","journal-title":"SP'02 Proceedings of the 2002 IEEE Symposium on Security and Privacy"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"2","article-title":"Passively monitoring networks at gigabit speeds using commodity hardware and open source software","author":"deri","year":"2003","journal-title":"Passive and Active Measurement Workshop 2003 (PAM2003)"},{"year":"2000","author":"axelsson","journal-title":"Intrusion Detection Systems A Survey and Taxonomy","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-540-24852-1_32","article-title":"A parallel intrusion detection system for high-speed networks","volume":"3089","author":"lai","year":"2004","journal-title":"Applied Cryptography and Network Security"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ICCCN.2004.1401591"},{"year":"2002","author":"jim","journal-title":"Achieving order through CHAOS The LLNL HPC Linux Cluster Experience","key":"6"},{"key":"5","article-title":"The MIT alewife machine: A large-scale distributed-memory multiprocessor","author":"agarwal","year":"1991","journal-title":"Proc Workshop on Scalable Shared Memory Multiprocessors"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1048935.1050200"},{"key":"9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-27767-5_15","article-title":"Network traffic sensor for multiprocessor architectures: Design improvement proposals","volume":"3126","author":"ferro","year":"2004","journal-title":"Service Assurance with Partial and Intermittent Resources"},{"year":"2000","author":"curry","journal-title":"Intrusion detection message exchange format Extensible markup language (XML) document type definition","key":"8"}],"event":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","start":{"date-parts":[[2005,5,20]]},"location":"St Louis, MO, USA","end":{"date-parts":[[2005,5,20]]}},"container-title":["Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10408\/33068\/01553297.pdf?arnumber=1553297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T19:19:31Z","timestamp":1586632771000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1553297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscst.2005.1553297","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}