{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:09:51Z","timestamp":1730300991898,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/tridentcom.2009.4976261","type":"proceedings-article","created":{"date-parts":[[2009,5,27]],"date-time":"2009-05-27T15:18:44Z","timestamp":1243437524000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment"],"prefix":"10.1109","author":[{"given":"Eve M.","family":"Schooler","sequence":"first","affiliation":[]},{"given":"Carl","family":"Livadas","sequence":"additional","affiliation":[]},{"given":"Joohwan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Prashant","family":"Gandhi","sequence":"additional","affiliation":[]},{"given":"Pablo R.","family":"Passera","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Chandrashekar","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Orrin","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Koyabe","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"El-Moussa","sequence":"additional","affiliation":[]},{"given":"Gogobada Daa","family":"Dabibi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_32"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"journal-title":"CANARY DeteCting Botnet Traffic At End-Hosts","year":"2008","author":"giroire","key":"12"},{"key":"3","article-title":"dependency-based distributed intrusion detection","author":"li","year":"2007","journal-title":"Proceedings of the Usenix Security Conference DETER Community Workshop"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162668"},{"key":"1","first-page":"1115","article-title":"when gossip is good: distributed probabilistic inference for detection of slow network intrusions","volume":"2","author":"dash","year":"2006","journal-title":"Proc Nat Conf Artif Intell"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_21"},{"journal-title":"Collaborative Malware Detection From theory to practice","year":"2008","author":"livadas","key":"7"},{"key":"6","article-title":"efficient inference in persistent dynamic bayesian networks","author":"singliar","year":"0","journal-title":"Proceedings of the 24th Annual Conference on Uncertainty in Artificial Intelligence UAI'08"},{"key":"5","first-page":"633","article-title":"cod: online temporal clustering for outbreak detection","volume":"1","author":"singliar","year":"2007","journal-title":"Proc Nat Conf Artif Intell"},{"key":"4","article-title":"an adaptive anomaly detector for worm detection","author":"agosta","year":"2007","journal-title":"Proceedings 2nd Usenix Workshop on Tackling Computer Systems Problems with Machine Learning Techniques"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1341431.1341443"},{"journal-title":"The Network Simulator","year":"0","key":"8"}],"event":{"name":"2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops","start":{"date-parts":[[2009,4,6]]},"location":"Washington, DC, USA","end":{"date-parts":[[2009,4,8]]}},"container-title":["2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks &amp; Communities and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4914931\/4976181\/04976261.pdf?arnumber=4976261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T20:15:21Z","timestamp":1489781721000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4976261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/tridentcom.2009.4976261","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}