{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:20:20Z","timestamp":1725456020857},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itre.2005.1503109","type":"proceedings-article","created":{"date-parts":[[2005,9,9]],"date-time":"2005-09-09T15:06:22Z","timestamp":1126278382000},"page":"225-229","source":"Crossref","is-referenced-by-count":0,"title":["Frame-based attack representation and real-time first order logic automatic reasoning"],"prefix":"10.1109","author":[{"family":"Wei Yan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Ansari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"The Intrusion Detection Message Exchange Format","year":"0","author":"curry","key":"3"},{"key":"2","article-title":"SEM: Navigating the seas of security event data","author":"king","year":"2004","journal-title":"Network Magazine"},{"year":"0","key":"10"},{"key":"1","first-page":"5","article-title":"Building scenarios from a het-erogeneous alert stream","author":"dain","year":"2001","journal-title":"IEEE Workshop on Information Assurance and Security"},{"journal-title":"Knowledge Representation and Reasoning","year":"2004","author":"brachman","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1984.1172810"},{"key":"5","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/LCN.2004.57","article-title":"Extracting attack scenario knowledge using pctcg and semantic networks","author":"yan","year":"2004","journal-title":"Proceedings of 29th Annual IEEE Conference on Local Computer Networks"},{"year":"0","key":"4"},{"journal-title":"Programming in Turbo Prolog with an Introduction to Knowledge-based Systems","year":"1989","author":"teft","key":"9"},{"year":"0","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586144"}],"event":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","location":"Hsinchu, Taiwan"},"container-title":["ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10051\/32244\/01503109.pdf?arnumber=1503109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T19:16:47Z","timestamp":1497640607000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1503109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/itre.2005.1503109","relation":{},"subject":[]}}