{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:19Z","timestamp":1750307419352,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,21]],"date-time":"2010-04-21T00:00:00Z","timestamp":1271808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,21]]},"DOI":"10.1145\/1852666.1852722","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Multistage attack detection system for network administrators using data mining"],"prefix":"10.1145","author":[{"given":"Rajeshwar","family":"Katipally","sequence":"first","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]},{"given":"Wade","family":"Gasior","sequence":"additional","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]},{"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN"}]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[{"name":"University of TN at Chattanooga, Chattanooga, TN"}]}],"member":"320","published-online":{"date-parts":[[2010,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244067"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179596"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179580"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179578"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179587"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772868"},{"key":"e_1_3_2_2_9_1","volume-title":"USA","author":"Dokas Kumar","year":"2004","unstructured":"Dokas , Kumar , Lazarevic , Srivastava , Tan , Data Mining for Network Intrusion Detection , USA , 2004 . Dokas, Kumar, Lazarevic, Srivastava, Tan, Data Mining for Network Intrusion Detection, USA, 2004."},{"key":"e_1_3_2_2_10_1","volume-title":"Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring","author":"Ghosh","year":"2002","unstructured":"Anup K. Ghosh , Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring , Santa Clara, California , 2002 . Anup K. Ghosh, Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, 2002."},{"key":"e_1_3_2_2_11_1","volume-title":"Introduction to data mining","author":"Pang-Ning Tan Michael Stenbach","year":"2006","unstructured":"Pang-Ning Tan , Michael Stenbach , Vipin Kumar . Introduction to data mining . Pearson Addison Wesley . 2006 . Pang-Ning Tan, Michael Stenbach, Vipin Kumar. Introduction to data mining. Pearson Addison Wesley. 2006."},{"key":"e_1_3_2_2_12_1","unstructured":"The snort. http:\/\/www.snort.org.  The snort. http:\/\/www.snort.org."},{"key":"e_1_3_2_2_13_1","volume-title":"Data mining concepts and techniques","author":"JiaweiHanand Micheline Kamber","year":"2001","unstructured":"JiaweiHanand Micheline Kamber , Data mining concepts and techniques . Academic Press , San Diego , California, 2001 JiaweiHanand Micheline Kamber, Data mining concepts and techniques. Academic Press, San Diego, California, 2001"}],"event":{"name":"CSIIRW '10: Annual Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '10","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852666.1852722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:41Z","timestamp":1750246781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,21]]},"references-count":13,"alternative-id":["10.1145\/1852666.1852722","10.1145\/1852666"],"URL":"https:\/\/doi.org\/10.1145\/1852666.1852722","relation":{},"subject":[],"published":{"date-parts":[[2010,4,21]]},"assertion":[{"value":"2010-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}