{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:59:35Z","timestamp":1758862775247,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599700","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"76-81","source":"Crossref","is-referenced-by-count":10,"title":["Characterizing the Effectiveness of Network-Based Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Eric","family":"Ficke","sequence":"first","affiliation":[]},{"given":"Kristin M.","family":"Schweitzer","sequence":"additional","affiliation":[]},{"given":"Raymond M.","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-319-11379-1_9"},{"key":"ref11","first-page":"56","article-title":"Analyzing malware detection eciency with multiple anti-malware programs","volume":"1","author":"morales","year":"2012","journal-title":"ASE Science Journal"},{"key":"ref12","first-page":"112","article-title":"Av-meter: An evaluation of antivirus scans and labels","author":"mohaisen","year":"2014","journal-title":"Proc DIMVA'2014"},{"year":"2014","author":"yardon","journal-title":"Symantec develops new attack on cyberhacking","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIFS.2018.2833292"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3190619.3190639"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3005714"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-642-04968-2_4","article-title":"A Labeled Data Set For Flow-based Intrusion Detection","author":"sperotto","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref4","article-title":"Intrusion detection systems: A survey and taxonomy","author":"axelsson","year":"2000","journal-title":"Tech Rep Technical Report"},{"year":"2018","journal-title":"Suricata I open source ids \/ ips \/ nsm engine","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICTAI.2011.176"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/APCC.2006.255840"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/S0167-4048(01)00806-9"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICSMC.2012.6377960"},{"year":"2018","journal-title":"SNORT network intrusion detection system","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/INM.2011.5990529"},{"key":"ref9","article-title":"Aldr: A new metric for measuring effective layering of defenses","author":"boggs","year":"2011","journal-title":"Fifth Layered Assurance Workshop (LAW'11)"},{"key":"ref20","article-title":"Combining multiple techniques for intrusion detection","volume":"6","author":"katar","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.ins.2013.03.022"},{"key":"ref21","first-page":"182","article-title":"Reliable alert fusion of multiple intrusion detection systems","volume":"19","author":"shah","year":"2017","journal-title":"International Journal of Security and Networks"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599700.pdf?arnumber=8599700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:20:36Z","timestamp":1643160036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599700","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}