{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:07:31Z","timestamp":1779203251993,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"FFG projects INDICAETING","award":["868306"],"award-info":[{"award-number":["868306"]}]},{"name":"DECEPT","award":["873980"],"award-info":[{"award-number":["873980"]}]},{"name":"EU projects GUARD","award":["833456"],"award-info":[{"award-number":["833456"]}]},{"name":"PANDORA","award":["SI2.835928"],"award-info":[{"award-number":["SI2.835928"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3201582","type":"journal-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T19:35:55Z","timestamp":1661456155000},"page":"3466-3482","source":"Crossref","is-referenced-by-count":40,"title":["Maintainable Log Datasets for Evaluation of Intrusion Detection Systems"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3813-3151","authenticated-orcid":false,"given":"Max","family":"Landauer","sequence":"first","affiliation":[{"name":"Center for Digital Safety &#x0026; Security, Austrian Institute of Technology, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1922-7892","authenticated-orcid":false,"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[{"name":"Center for Digital Safety &#x0026; Security, Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Maximilian","family":"Frank","sequence":"additional","affiliation":[{"name":"Center for Digital Safety &#x0026; Security, Austrian Institute of Technology, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-4997","authenticated-orcid":false,"given":"Wolfgang","family":"Hotwagner","sequence":"additional","affiliation":[{"name":"Center for Digital Safety &#x0026; Security, Austrian Institute of Technology, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3259-6972","authenticated-orcid":false,"given":"Markus","family":"Wurzenberger","sequence":"additional","affiliation":[{"name":"Center for Digital Safety &#x0026; Security, Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Andreas","family":"Rauber","sequence":"additional","affiliation":[{"name":"Institute of Information Systems Engineering, Vienna University of Technology, Vienna, Austria"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3510547.3517924"},{"key":"ref35","article-title":"MITRE ATT&CK","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3031317"},{"key":"ref34","article-title":"Penetration testing complete tools list","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.005"},{"key":"ref14","article-title":"AIT log data set V2.0","author":"landauer","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74450-2"},{"key":"ref31","article-title":"Internet security threat report","year":"2019"},{"key":"ref30","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"he","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref33","article-title":"Fireeye m-trends 2010: The advanced persistent threat","year":"0"},{"key":"ref10","first-page":"217","article-title":"Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset","volume":"6","author":"?eponis","year":"2018","journal-title":"Baltic Journal of Modern Computing"},{"key":"ref32","first-page":"1","article-title":"ISO\/IEC 27033-3. Information technology &#x2013; Security techniques &#x2013; Network security &#x2013; Part 3: Reference networking scenarios &#x2013; Threats, design techniques and control issues","volume":"2010","year":"2010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.99"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref16","first-page":"415","article-title":"Learning to log: helping developers make informed logging decisions","author":"zhu","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref38","article-title":"Predicting domain generation algorithms with long short-term memory networks","author":"woodbridge","year":"2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref24","article-title":"VAST challenge 2011 MC2 - computer networking operations","author":"grinstein","year":"2011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref26","article-title":"Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks","author":"creech","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.97"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_36"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.009"},{"key":"ref22","article-title":"KDD Cup 1999 data","author":"stolfo","year":"1999"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3143402"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3510581"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/app8122663"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890935"},{"key":"ref29","first-page":"135","article-title":"A modern and sophisticated host based intrusion detection data set","volume":"16","author":"grimmer","year":"2019","journal-title":"IT-Sicherheit als Voraussetzung f&#x00FC;r eine erfolgreiche Digitalisierung"},{"key":"ref8","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","author":"ring","year":"2017","journal-title":"Proc 16th Eur Conf Cyber Warfare Secur"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1016\/j.future.2020.02.051","article-title":"Real time dataset generation framework for intrusion detection systems in IoT","volume":"108","author":"al-hadhrami","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1117\/12.777341"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(99)00021-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEED.2015.7409013"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09866880.pdf?arnumber=9866880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:38:45Z","timestamp":1690915125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9866880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3201582","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}