{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:47:04Z","timestamp":1773787624621,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,11]]},"DOI":"10.1145\/1162666.1162669","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"115-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Towards scalable and robust distributed intrusion alert fusion with good load balancing"],"prefix":"10.1145","author":[{"given":"Zhichun","family":"Li","sequence":"first","affiliation":[{"name":"Northwestern University, Evanston, IL"}]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL"}]},{"given":"Aaron","family":"Beach","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL"}]}],"member":"320","published-online":{"date-parts":[[2006,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DIGITAL SIGNATURE STANDARD (DSS) 1994 FIPS PUB 186. DIGITAL SIGNATURE STANDARD (DSS) 1994 FIPS PUB 186."},{"key":"e_1_3_2_1_2_1","unstructured":"Virus names could be standardized 2004. Computer Business Review Online http:\/\/www.cbronline.com\/article_news.asp?guid=11D11704-DE5B-45BD-AF4B-%45D8F44E055C.  Virus names could be standardized 2004. Computer Business Review Online http:\/\/www.cbronline.com\/article_news.asp?guid=11D11704-DE5B-45BD-AF4B-%45D8F44E055C."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.63"},{"key":"e_1_3_2_1_5_1","unstructured":"Cert Cc. Statistics 1988--2005. http:\/\/www.cert.org\/stats\/cert_stats.html.  Cert Cc. Statistics 1988--2005. http:\/\/www.cert.org\/stats\/cert_stats.html."},{"key":"e_1_3_2_1_8_1","volume-title":"RAID","author":"Dagon D.","year":"2004"},{"key":"e_1_3_2_1_10_1","volume-title":"Conference on Innovative Data Systems Research (CIDR)","author":"Huebsch R.","year":"2005"},{"key":"e_1_3_2_1_11_1","unstructured":"INSECURE.ORG. Idle scanning and related ipid games 2004. http:\/\/www.insecure.org\/nmap\/idlescan.html.  INSECURE.ORG. Idle scanning and related ipid games 2004. http:\/\/www.insecure.org\/nmap\/idlescan.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/938984.939801"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511485"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495971"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251329"},{"key":"e_1_3_2_1_18_1","unstructured":"Moore D. etal Internet quarantine: Requirements for containing self-propagating code. In IEEE Infocom (2003).  Moore D. et al. Internet quarantine: Requirements for containing self-propagating code. In IEEE Infocom (2003)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194868"},{"key":"e_1_3_2_1_20_1","volume-title":"the 20th NIS Security Conference","author":"Porras P. A.","year":"1997"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of USENIX Security Symposium","author":"Rajab M.","year":"2005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of USENIX","author":"Rhea S.","year":"2004"},{"key":"e_1_3_2_1_25_1","unstructured":"SANS INSTITUTE.Dshield.org: Distributed intrusion detection system http:\/\/www.dshield.org\/.  SANS INSTITUTE.Dshield.org: Distributed intrusion detection system http:\/\/www.dshield.org\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)","author":"Singh S.","year":"2004"},{"key":"e_1_3_2_1_27_1","volume-title":"the 14th National Computer Security Conference","author":"Snapp S. R.","year":"1991"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029624"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_31_1","unstructured":"SYMANTEC INC. Symantec internet security threat report March 2005. http:\/\/enterprisesecurity.Symantec.com\/content.cfm?articleid=1539.  SYMANTEC INC. Symantec internet security threat report March 2005. http:\/\/enterprisesecurity.Symantec.com\/content.cfm?articleid=1539."},{"key":"e_1_3_2_1_32_1","volume-title":"DARPA Sponsored Report","author":"Weaver N.","year":"2003"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948190"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781045"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of NDSS","author":"Yegneswaran V.","year":"2004"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948136"}],"event":{"name":"SIGCOMM06: ACM SIGCOMM 2006 Conference","location":"Pisa Italy","acronym":"SIGCOMM06"},"container-title":["Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1162666.1162669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T11:35:58Z","timestamp":1673523358000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1162666.1162669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,11]]},"references-count":33,"alternative-id":["10.1145\/1162666.1162669","10.1145\/1162666"],"URL":"https:\/\/doi.org\/10.1145\/1162666.1162669","relation":{},"subject":[],"published":{"date-parts":[[2006,9,11]]},"assertion":[{"value":"2006-09-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}