{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:59:58Z","timestamp":1767085198864,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565048","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T20:05:44Z","timestamp":1216325144000},"page":"167-172","source":"Crossref","is-referenced-by-count":13,"title":["Intrusion activity projection for cyber situational awareness"],"prefix":"10.1109","author":[{"given":"Shanchieh J.","family":"Yang","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Byers","sequence":"additional","affiliation":[]},{"given":"Jared","family":"Holsopple","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Argauer","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Fava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"context-based intrusion detection using snort, nessus and bugtraq databases","author":"massicotte","year":"2005","journal-title":"Proceedings of the Third Annual Conference on Privacy Security and Trust"},{"journal-title":"Text Compression","year":"1990","author":"bell","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"journal-title":"SANS Critical Vulnerability Analysis Archive","year":"0","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/IDC.2007.374564"},{"year":"0","key":"34"},{"article-title":"using vulnerability trees for decision making in threat assessment","year":"2003","author":"vidalis","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.15"},{"key":"14","article-title":"tandi: threat assessment for networked data and information","volume":"6242","author":"holsopple","year":"2006","journal-title":"Proc SPIE Security Defense Symp Multisensor Multisource Information Fusion Architectures Algorithms and Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"12","first-page":"370","article-title":"attack plan recognition and prediction using causal networks","author":"qin","year":"2004","journal-title":"Proceedings of the 20th Annual Computer Security Applications Conference"},{"journal-title":"Nessus Vulnerability Scanner","year":"0","key":"21"},{"journal-title":"Sourcefire Snort An open source network intrusion prevention and detection system","year":"2007","key":"20"},{"journal-title":"SecurityFocus Bugtraq vulnerability database","year":"2006","key":"22"},{"key":"23","article-title":"virtual terrain: a common representation of a computer network","volume":"6973","author":"holsopple","year":"2008","journal-title":"Proceedings of SPIE Defense and Security Symposium Data Mining Intrusion Detection Information Assurance and Data Networks Security Conference"},{"year":"0","key":"24"},{"journal-title":"National vulnerability database (NVD)","year":"0","key":"25"},{"journal-title":"Common Vulnerabilities and Exposures CVE dictionary","year":"0","key":"26"},{"journal-title":"A database of computer attacks for the evaluation of intrusion detection systemdetection systems","year":"1999","author":"kendall","key":"27"},{"journal-title":"Cyber attack with background traffic data set","year":"1998","key":"28"},{"year":"1999","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45474-8_4","article-title":"probabilistic alert correlation","volume":"2212","author":"valdes","year":"2001","journal-title":"Springer-Verlag Lecture Notes in Computer Science"},{"article-title":"intrusion detection systems: a survey and taxonomy","year":"2000","author":"axelsson","key":"1"},{"journal-title":"DEFCON conference DEFCON Capture the Flag (CTF) contest","year":"0","key":"30"},{"key":"7","article-title":"enriching intrusion alerts through multi-host causality","author":"king","year":"2005","journal-title":"Proceedings of the 2005 Network and Distributed System Security Symposium (NDSS'05)"},{"key":"6","article-title":"fusing a heterogeneous alert stream into scenarios","author":"dain","year":"2001","journal-title":"ACM Workshop Data Mining for Security Applications"},{"journal-title":"US-CERT vulnerability note field descriptions","year":"0","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991518"},{"journal-title":"Microsoft Security Response Center Security Bulletin Severity Rating System","year":"0","key":"31"},{"key":"4","article-title":"the work of intrusion detection: rethinking the role of security analysts","author":"goodall","year":"2004","journal-title":"Proceedings of the Americas Conference on Information Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2007.4408113"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586144"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565048.pdf?arnumber=4565048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:58:06Z","timestamp":1497779886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4565048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565048","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}