{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:14:37Z","timestamp":1769012077186,"version":"3.49.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ssci.2016.7849902","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:24:33Z","timestamp":1487265873000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["Morwilog: an ACO-based system for outlining multi-step attacks"],"prefix":"10.1109","author":[{"given":"Julio","family":"Navarro-Lara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aline","family":"Deruyver","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pierre","family":"Parrend","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808616"},{"key":"ref38","author":"pokorny","year":"2007","journal-title":"Proto-Indo-European Etymological Dictionary"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2015.8.3.3"},{"key":"ref32","article-title":"A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection","volume":"2","author":"abadeh","year":"2015","journal-title":"ISC International Journal of Information Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.027"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.024"},{"key":"ref37","first-page":"509","article-title":"Simulating targeted attacks using research honeypots based on ant colony metaphor","volume":"17","author":"mahanti","year":"2005","journal-title":"European Journal of Scientific Research"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3166\/tsi.26.1245-1267"},{"key":"ref35","author":"valigiani","year":"2006","journal-title":"D&#x00E9;veloppement d'un paradigme d'optimisation par Hom-mili&#x00E8;re et application &#x00E1; l'enseignement assist&#x00E8; par ordinateur sur internet"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.57"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1201\/b15088","author":"bhattacharyya","year":"2013","journal-title":"Network Anomaly Detection A Machine Learning Perspective"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2011.5929072"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSS.2011.6058565"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2012.6408197"},{"key":"ref14","first-page":"1","article-title":"Real-time intrusion alert correlation system based on prerequisites and consequence","author":"zhaowen","year":"2010","journal-title":"6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2012.6292441"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.09.006"},{"key":"ref17","first-page":"107","author":"pugliese","year":"2015","journal-title":"The AC-Index Fast Online Detection of Correlated Alerts"},{"key":"ref18","author":"meier","year":"2007","journal-title":"Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/106454699568700"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918236"},{"key":"ref4","first-page":"127","volume":"63","author":"suarez-tangil","year":"2009","journal-title":"Automatic Rule Generation Based on Genetic Programming for Event Correlation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMA.2009.5156550"},{"key":"ref3","first-page":"1542","article-title":"An automatic approach to extract the formats of network and security log messages","author":"ya","year":"2015","journal-title":"IEEE Military Communications Conference MILCOM"},{"key":"ref6","author":"kavanagh","year":"2015","journal-title":"Magic Quadrant for Security Information and Event Management"},{"key":"ref29","article-title":"Agent based parallelized intrusion detection system using ant colony optimization","volume":"105","author":"jeyepalan","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INM.1999.770686"},{"key":"ref8","author":"m\u00fcller","year":"2009","journal-title":"Event Correlation Engine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.26"},{"key":"ref2","year":"2010","journal-title":"Standard on logging and monitoring"},{"key":"ref9","year":"2014","journal-title":"Life cycle of a log"},{"key":"ref1","year":"2016","journal-title":"SIEM Security Information and Event Management software gives companies insight into both security and business operations"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1515\/9781400835447","author":"gordon","year":"2010","journal-title":"Ant Encounters Interaction Networks and Colony Behavior"},{"key":"ref22","article-title":"Positive feedback as a search strategy","author":"dorigo","year":"1991","journal-title":"Report 91-016"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1290.001.0001","author":"dorigo","year":"2004","journal-title":"Ant Colony Optimization"},{"key":"ref42","first-page":"136","article-title":"A standard audit trail format","author":"bishop","year":"1995","journal-title":"Proceedings of the 18th National Information Systems Security Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5772\/51695"},{"key":"ref41","author":"hazekamp","year":"2016","journal-title":"Splunk eventgen"},{"key":"ref23","author":"dorigo","year":"1992","journal-title":"Optimization learning and natural algorithms"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.21"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3458-4"},{"key":"ref25","first-page":"146","author":"fernandez","year":"2014","journal-title":"Scheduling a Galvanizing Line by Ant Colony Optimization"}],"event":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","location":"Athens","start":{"date-parts":[[2016,12,6]]},"end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840087\/7849361\/07849902.pdf?arnumber=7849902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T03:49:04Z","timestamp":1579060144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7849902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ssci.2016.7849902","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}