{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T21:19:54Z","timestamp":1744492794359,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122812","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"156-161","source":"Crossref","is-referenced-by-count":2,"title":["A semantic analysis approach to manage IDS alerts flooding"],"prefix":"10.1109","author":[{"given":"Sherif","family":"Saad","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8741-7_28"},{"key":"17","first-page":"317","article-title":"An ontology for network security attacks","volume":"3285","author":"peter","year":"2004","journal-title":"LNCS"},{"key":"18","article-title":"An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies","author":"gustavo isaza","year":"0","journal-title":"7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"16","article-title":"A Target-Centric Ontology for Intrusion Detection","author":"undercoffer","year":"0","journal-title":"The 18th International Joint Conference on Artificial Intelligence July 2003"},{"journal-title":"Intrusion Detection and Correlation Challenges and Solutions","year":"2004","author":"kruegel","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.36"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508180"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593235"},{"key":"20","first-page":"317","article-title":"An ontology for network security attacks","volume":"3285","author":"peter","year":"2004","journal-title":"LNCS"},{"key":"22","article-title":"An Intrinsic Information Content Metric for Semantic Similarity in WordNet","author":"seco","year":"0","journal-title":"ECAI'2004 the 16th European Conference on Artificial Intelligence 2004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.10.001"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1162\/089892904322926773"},{"journal-title":"DARPA Intrusion Detection Evaluation","year":"0","key":"25"},{"journal-title":"The 2002 Ucsb Treasure Hunt Dataset","year":"0","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","article-title":"Probabilistic alert correlation","author":"valdes","year":"2001","journal-title":"RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2008.116"},{"key":"2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","article-title":"Aggregation and correlation of intrusiondetection alerts","author":"debar","year":"2001","journal-title":"RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection"},{"key":"10","first-page":"1","author":"xu","year":"2008","journal-title":"An Ids Alert Fusion Approach Based on Happened before Relation"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WAIM.2008.104"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2009.5228172"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/AICI.2009.487"},{"key":"4","first-page":"695","article-title":"A lightweight intrusion alert fusion system","author":"wen","year":"2010","journal-title":"High Performance Computing and Communications (HPCC) 2010 12th IEEE International Conference on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2007.20"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.38"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122812.pdf?arnumber=6122812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:57Z","timestamp":1497947817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122812","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}