{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:07:29Z","timestamp":1729649249815,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550338","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T14:08:16Z","timestamp":1214402896000},"page":"234-243","source":"Crossref","is-referenced-by-count":32,"title":["Modeling and detection of complex attacks"],"prefix":"10.1109","author":[{"given":"Seyit Ahmet","family":"Camtepe","sequence":"first","affiliation":[]},{"given":"Bulent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Wep crack and airsnort","author":"rager","year":"2005","journal-title":"Sourceforge"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366183"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref15","article-title":"Attack languages","author":"vigna","year":"2000","journal-title":"Information Survivability Workshop"},{"key":"ref16","article-title":"The stat tool suite","author":"vigna","year":"2000","journal-title":"DARPA Information Survivability Conference and Exposition"},{"article-title":"Classification and detection of computer intrusions","year":"1995","author":"kumar","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932188"},{"key":"ref19","article-title":"A novel technique of recognizing multi-stage attack behaviour","author":"li","year":"2006","journal-title":"Proceedings of Network Architecture and Storage"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"ref4","article-title":"Tree automata techniques and applications","author":"comon","year":"2005","journal-title":"a book under construction"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/11427995_21","article-title":"Modeling and multiway analysis of chatroom tensors","author":"acar","year":"2005","journal-title":"IEEE International Conference on Intelligence and Security Informatics"},{"key":"ref3","article-title":"Attack trees: Modeling security threats","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"key":"ref6","article-title":"B gp attack tree","author":"convery","year":"2001","journal-title":"The Internet Engineering Task Force"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in the key scheduling algorithm of rc 4","author":"fluhrer","year":"2001","journal-title":"8th Annual International Workshop on Selected Areas in Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/508832.508843"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2004.1288037"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039705"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1285396"},{"key":"ref9","article-title":"Foundations of attack trees","author":"mauw","year":"2005","journal-title":"International Conference on Information Security and Cryptology"},{"key":"ref1","article-title":"Preventing and detecting insider attacks using ids","author":"einwechter","year":"2002","journal-title":"SecurityFocus"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"ref22","article-title":"Insider threat prediction tool: Evaluating the probability of it misuse","volume":"21","author":"magklaras","year":"2002","journal-title":"Computers and Security"},{"key":"ref21","article-title":"A preliminary structural approach to insider computer misuse incidents","author":"tuglular","year":"2000","journal-title":"1st European Anti-Malware Conference (EICAR 2000)"},{"key":"ref24","article-title":"An initial security analysis of the ieee 802.1x standard","author":"mishra","year":"2002","journal-title":"Tech Rep CS- TR-4328"},{"key":"ref23","article-title":"A detection-oriented classification of insider it misuse","author":"phyo","year":"2004","journal-title":"Third Security Conference"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25952-7_19"},{"journal-title":"Matrix Computations","year":"1996","author":"golub","key":"ref25"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550338.pdf?arnumber=4550338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T05:56:49Z","timestamp":1557640609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550338","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}