{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:18Z","timestamp":1750307418850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,21]],"date-time":"2010-04-21T00:00:00Z","timestamp":1271808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,21]]},"DOI":"10.1145\/1852666.1852712","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Alerts visualization and clustering in network-based intrusion detection"],"prefix":"10.1145","author":[{"given":"Swetha","family":"Dasireddy","sequence":"first","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]},{"given":"Wade","family":"Gasior","sequence":"additional","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]},{"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN"}]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]}],"member":"320","published-online":{"date-parts":[[2010,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244067"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772868"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179596"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179578"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179587"},{"key":"e_1_3_2_2_8_1","unstructured":"The snort. http:\/\/www.snort.org.  The snort. http:\/\/www.snort.org."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179580"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"volume-title":"USA","year":"2004","key":"e_1_3_2_2_11_1","unstructured":"Dokas, Kumar, Lazarevic, Srivastava, Tan , Data Mining for Network Intrusion Detection , USA , 2004 . Dokas, Kumar, Lazarevic, Srivastava, Tan, Data Mining for Network Intrusion Detection, USA, 2004."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of 2005 ACM symposium on applied computing, USA","author":"Goodall John R.","year":"2005","unstructured":"John R. Goodall , et al. A User - Center ed Approach to visualizing Network Traffic for Intrusion Detection . Proceedings of 2005 ACM symposium on applied computing, USA , 2005 . John R. Goodall, et al. A User - Centered Approach to visualizing Network Traffic for Intrusion Detection. Proceedings of 2005 ACM symposium on applied computing, USA, 2005."},{"key":"e_1_3_2_2_13_1","volume-title":"Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring","author":"Ghosh Anup K.","year":"2002","unstructured":"Anup K. Ghosh , Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring , Santa Clara, California , 2002 . Anup K. Ghosh, Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, 2002."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322526"},{"key":"e_1_3_2_2_15_1","volume-title":"Introduction to data mining","author":"Tan Pang-Ning","year":"2006","unstructured":"Pang-Ning Tan , Michael Stenbach , Vipin Kumar . Introduction to data mining . Pearson Addison Wesley . 2006 . Pang-Ning Tan, Michael Stenbach, Vipin Kumar. Introduction to data mining. Pearson Addison Wesley. 2006."},{"key":"e_1_3_2_2_16_1","unstructured":"Simetrics. http:\/\/www.dcs.shef.ac.uk\/~sam\/stringmetrics.html  Simetrics. http:\/\/www.dcs.shef.ac.uk\/~sam\/stringmetrics.html"}],"event":{"name":"CSIIRW '10: Annual Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '10","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852666.1852712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:41Z","timestamp":1750246781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,21]]},"references-count":16,"alternative-id":["10.1145\/1852666.1852712","10.1145\/1852666"],"URL":"https:\/\/doi.org\/10.1145\/1852666.1852712","relation":{},"subject":[],"published":{"date-parts":[[2010,4,21]]},"assertion":[{"value":"2010-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}