{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:06:22Z","timestamp":1758845182221,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2002.1004378","type":"proceedings-article","created":{"date-parts":[[2005,8,25]],"date-time":"2005-08-25T03:23:34Z","timestamp":1124940214000},"page":"285-293","source":"Crossref","is-referenced-by-count":72,"title":["Stateful intrusion detection for high-speed network's"],"prefix":"10.1109","author":[{"given":"C.","family":"Kruegel","sequence":"first","affiliation":[]},{"given":"F.","family":"Valeur","sequence":"additional","affiliation":[]},{"given":"G.","family":"Vigna","sequence":"additional","affiliation":[]},{"given":"R.","family":"Kemmerer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ISS BlackICE Sentry Gigabit","year":"2001","key":"ref4"},{"journal-title":"Technical Report","article-title":"NSS Group. Intrusion Detection and Vulnerability Assessment","year":"2000","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319712"},{"key":"ref6","article-title":"Bro: A System for Detecting Network Intruders in Real-Time","author":"paxson","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"journal-title":"Toplayer networks","year":"2001","key":"ref11"},{"journal-title":"MIT Lincoln Laboratory DARPA Evaluation Intrusion Detection","year":"1999","key":"ref5"},{"journal-title":"tcpreplay Software Package","year":"1999","author":"undy","key":"ref12"},{"journal-title":"Writing Snort rules How to write Snort rules and keep your sanity","year":"0","author":"roesch","key":"ref8"},{"key":"ref7","first-page":"1","article-title":"From Declarative Signatures to Misuse IDS","volume":"2212","author":"pouzol","year":"2001","journal-title":"LNCS"},{"key":"ref2","article-title":"STATL: An Attack Language for State-based Intrusion Detection","author":"eckmann","year":"2000","journal-title":"Proceedings of the ACM Workshop on Intrusion Detection Systems"},{"key":"ref9","article-title":"Snort - Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"Proceedings of the USENIX LISA '99 Conference"},{"journal-title":"CISCO CISCO Intrusion Detection System Technical Information","year":"2001","key":"ref1"}],"event":{"name":"2002 IEEE Symposium on Security and Privacy","acronym":"SECPRI-02","location":"Berkeley, CA, USA"},"container-title":["Proceedings 2002 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7873\/21681\/01004378.pdf?arnumber=1004378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T23:50:34Z","timestamp":1489189834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1004378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/secpri.2002.1004378","relation":{},"subject":[]}}