{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:42:24Z","timestamp":1725482544907},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/saint.2003.1183056","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T11:38:00Z","timestamp":1061984280000},"page":"242-248","source":"Crossref","is-referenced-by-count":10,"title":["On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems"],"prefix":"10.1109","author":[{"given":"W.H.","family":"Allen","sequence":"first","affiliation":[]},{"given":"G.A.","family":"Marin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"ref11","article-title":"Decision analysis of network-based intrusion detection systems for denial-of-service attacks","author":"li","year":"2001","journal-title":"Proceedings of IEEE International Conferences on Info-tech and Info-net"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935051"},{"key":"ref14","article-title":"Comparing local search with respect to genetic evolution to detect intrusions in computer networks","author":"neri","year":"2000","journal-title":"Proceedings Congress on Evolutionary Computation"},{"key":"ref15","article-title":"Fast approximation of self-similar network traf-fic","author":"paxson","year":"1995","journal-title":"Technical report LBL-36750 Lawrence Berkley Laboratory"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45474-8_11","article-title":"Experiences with specification-based intrusion detection","author":"uppuluri","year":"2001","journal-title":"Proc Recent Advances in Intrusion Detection (RAID 2001)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932190"},{"key":"ref5","article-title":"1999 DARPA intrusion detection evaluation: Design and procedures","author":"haines","year":"2001","journal-title":"Lincoln Laboratory Technical Report 1062"},{"journal-title":"Intrusion detection evaluation web site","year":"2002","author":"laboratory","key":"ref8"},{"journal-title":"tcpdump a network packet capture program","year":"1989","author":"jacobson","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/26.380206"},{"journal-title":"Statistics for Long-Memory Processes","year":"1994","author":"beran","key":"ref1"},{"key":"ref9","article-title":"Self-similar traffic generation: The random midpoint displacement algorithm and its properties","author":"lau","year":"1995","journal-title":"Proceedings IEEE International Conference on Communications"}],"event":{"name":"2003 Symposium on Applications and the Internet (SAINT 2003)","acronym":"SAINT-03","location":"Orlando, FL, USA"},"container-title":["2003 Symposium on Applications and the Internet, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8426\/26546\/01183056.pdf?arnumber=1183056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:08:55Z","timestamp":1497557335000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1183056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/saint.2003.1183056","relation":{},"subject":[]}}