{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T14:30:56Z","timestamp":1774276256137,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T00:00:00Z","timestamp":1319155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,21]]},"DOI":"10.1145\/2046684.2046694","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Prioritizing intrusion analysis using Dempster-Shafer theory"],"prefix":"10.1145","author":[{"given":"Loai","family":"Zomlot","sequence":"first","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Sathya Chandran","family":"Sundaramurthy","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Kui","family":"Luo","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Xinming","family":"Ou","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"S. Raj","family":"Rajagopalan","sequence":"additional","affiliation":[{"name":"HP Labs, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Snort rules documentation:http:\/\/www.snort.org.  Snort rules documentation:http:\/\/www.snort.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_16"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"e_1_3_2_1_4_1","volume-title":"Advances in Neural Information Processing Systems (NIPS, page","author":"Barreno Marco","year":"2008","unstructured":"Marco Barreno , Alvaro A. C\u00e1rdenas , and J. D. Tygar . Optimal roc curve for a combination of classifiers . In In Advances in Neural Information Processing Systems (NIPS, page 2008 , 2007. Marco Barreno, Alvaro A. C\u00e1rdenas, and J. D. Tygar. Optimal roc curve for a combination of classifiers. In In Advances in Neural Information Processing Systems (NIPS, page 2008, 2007."},{"key":"e_1_3_2_1_5_1","volume-title":"A hypothesis-based approach to digital forensic investigations. Technical report","author":"Carrier Brian","year":"2006","unstructured":"Brian Carrier . A hypothesis-based approach to digital forensic investigations. Technical report , Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University , 2006 . Brian Carrier. A hypothesis-based approach to digital forensic investigations. Technical report, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2831339"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.123"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830542"},{"key":"e_1_3_2_1_10_1","volume-title":"9th International Conference on Information Fusion","author":"Denceux Thierry","year":"2006","unstructured":"Thierry Denceux . The cautious rule of combination for belief functions and some extensions . In 9th International Conference on Information Fusion , 2006 . Thierry Denceux. The cautious rule of combination for belief functions and some extensions. In 9th International Conference on Information Fusion, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Theories of Probability","author":"Fine T. L.","year":"1973","unstructured":"T. L. Fine . Theories of Probability . Academic Press , New York , 1973 . T. L. Fine. Theories of Probability. Academic Press, New York, 1973."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368332"},{"key":"e_1_3_2_1_13_1","volume-title":"Reasoning about uncertainty","author":"Halpern Joseph Y.","year":"2005","unstructured":"Joseph Y. Halpern . Reasoning about uncertainty . The MIT Press , London ,England, 2005 . Joseph Y. Halpern. Reasoning about uncertainty. The MIT Press, London,England, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68282-2","volume-title":"Bayesian Networks and Decision Graphs","author":"Jensen Finn V.","year":"2007","unstructured":"Finn V. Jensen and Thomas D. Nielsen . Bayesian Networks and Decision Graphs . Springer Verlag , 2007 . Finn V. Jensen and Thomas D. Nielsen. Bayesian Networks and Decision Graphs. Springer Verlag, 2007."},{"key":"e_1_3_2_1_15_1","unstructured":"Argus Lab. Snort intrusion analysis using proof strengthening (SnIPS). http:\/\/people.cis.ksu.edu\/ xou\/argus\/software\/snips\/.  Argus Lab. Snort intrusion analysis using proof strengthening (SnIPS). http:\/\/people.cis.ksu.edu\/ xou\/argus\/software\/snips\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996947"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.53"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.2172\/800792","volume-title":"Combination of evidence in Dempster-Shafer theory. Technical report","author":"Sentz K.","year":"2002","unstructured":"K. Sentz and S. Ferson . Combination of evidence in Dempster-Shafer theory. Technical report , Sandia National Laboratories, Albuquerque, New Mexico ., 2002 . K. Sentz and S. Ferson. Combination of evidence in Dempster-Shafer theory. Technical report, Sandia National Laboratories, Albuquerque, New Mexico., 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"Shafer G.","year":"1976","unstructured":"G. Shafer . A Mathematical Theory of Evidence . Princeton University Press , 1976 . G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, 1976."},{"key":"e_1_3_2_1_24_1","volume-title":"The problem of dependent evidence. Technical report","author":"Shafer Glenn","year":"1984","unstructured":"Glenn Shafer . The problem of dependent evidence. Technical report , University of Kansas , 1984 . Glenn Shafer. The problem of dependent evidence. Technical report, University of Kansas, 1984."},{"key":"e_1_3_2_1_25_1","volume-title":"The Analysis of Fuzzy Information","author":"Shafer Glenn","year":"1986","unstructured":"Glenn Shafer . Belief functions and possibility measures . The Analysis of Fuzzy Information , 1986 . Glenn Shafer. Belief functions and possibility measures. The Analysis of Fuzzy Information, 1986."},{"key":"e_1_3_2_1_26_1","volume-title":"Probability judgment in artificial intelligence and expert systems. Statistical Science, 2(1)","author":"Shafer Glenn","year":"1987","unstructured":"Glenn Shafer . Probability judgment in artificial intelligence and expert systems. Statistical Science, 2(1) , 1987 . Glenn Shafer. Probability judgment in artificial intelligence and expert systems. Statistical Science, 2(1), 1987."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788714.1788743"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"key":"e_1_3_2_1_29_1","volume-title":"the 2011 International Conference on Security and Management (SAM'11)","author":"Sundaramurthy Sathya Chandran","year":"2011","unstructured":"Sathya Chandran Sundaramurthy , Loai Zomlot , and Xinming Ou . Practical IDS alert correlation in the face of dynamic threats . In the 2011 International Conference on Security and Management (SAM'11) , Las Vegas, USA , July 2011 . Sathya Chandran Sundaramurthy, Loai Zomlot, and Xinming Ou. Practical IDS alert correlation in the face of dynamic threats. In the 2011 International Conference on Security and Management (SAM'11), Las Vegas, USA, July 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Correlation of intrusion alarms with subjective logic. In sixth Nordic Workshop on Secure IT systems (NordSec)","author":"Svensson Helen","year":"2001","unstructured":"Helen Svensson and Audun J\u03c6sang . Correlation of intrusion alarms with subjective logic. In sixth Nordic Workshop on Secure IT systems (NordSec) , 2001 . Helen Svensson and Audun J\u03c6sang. Correlation of intrusion alarms with subjective logic. In sixth Nordic Workshop on Secure IT systems (NordSec), 2001."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_33"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167289"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_24"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.29"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210267"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM workshop on Security and artificial intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046684.2046694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046684.2046694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046684.2046694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,21]]},"references-count":36,"alternative-id":["10.1145\/2046684.2046694","10.1145\/2046684"],"URL":"https:\/\/doi.org\/10.1145\/2046684.2046694","relation":{},"subject":[],"published":{"date-parts":[[2011,10,21]]},"assertion":[{"value":"2011-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}