{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:43:01Z","timestamp":1729640581849,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/isi.2009.5137285","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T11:06:03Z","timestamp":1246446363000},"page":"137-142","source":"Crossref","is-referenced-by-count":12,"title":["Intrusion detection based on &amp;#x201C;Hybrid&amp;#x201D; propagation in Bayesian Networks"],"prefix":"10.1109","author":[{"given":"Farah","family":"Jemili","sequence":"first","affiliation":[]},{"given":"Montaceur","family":"Zaghdoud","sequence":"additional","affiliation":[]},{"given":"Mohamed Ben","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","first-page":"294","article-title":"learning bayesian networks with discrete variables from data","author":"spirtes","year":"1995","journal-title":"Proceedings First International Conference on Knowledge Discovery and Data Mining"},{"journal-title":"Repre?sentation et propagation de connaissances impre?cises et incertaines Application a? l'e?valuation des risques lie?es aux sites et aux sols pollue?s","year":"2006","author":"baudrit","key":"14"},{"journal-title":"The 1998 intrusion detection off-line evaluation plan","year":"1998","key":"11"},{"key":"12","article-title":"analysis of three intrusion detection system benchmark datasets using machine learning algorithms","author":"kayacik","year":"2005","journal-title":"Proc IEEE ISIE"},{"journal-title":"Knowledge Discovery in Databases","year":"1999","key":"3"},{"year":"0","key":"2"},{"journal-title":"Bayesian Event Classification for Intrusion Detection Reliable Software Group","year":"2003","author":"christopher","key":"1"},{"key":"10","first-page":"31","article-title":"learning causal networks from data: a survey and a new algorithm for recovering possibilistic causal networks","volume":"10","author":"sanguesa","year":"1997","journal-title":"AI communications"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-2748-9","author":"spirtes","year":"1993","journal-title":"Causation Prediction and Search"},{"article-title":"network security: bayesian network intrusion detection (bnids)","year":"2003","author":"krister","key":"6"},{"key":"5","article-title":"the base-rate fallacy and its implications for the difficulty of intrusion detection","author":"axelsson","year":"1999","journal-title":"6th ACM Conference on Computer and Communications Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3502-4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994110"},{"key":"8","first-page":"255","article-title":"equivalence and synthesis of causal models","volume":"6","author":"verma","year":"1991","journal-title":"Uncertainty in Artificial Intelligence"}],"event":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","start":{"date-parts":[[2009,6,8]]},"location":"Richardson, TX, USA","end":{"date-parts":[[2009,6,11]]}},"container-title":["2009 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5089313\/5137253\/05137285.pdf?arnumber=5137285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:28:38Z","timestamp":1497806918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isi.2009.5137285","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}