{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:21:52Z","timestamp":1757456512473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134645","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"200-211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Smoke Detector"],"prefix":"10.1145","author":[{"given":"Kevin A.","family":"Roundy","sequence":"first","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Acar","family":"Tamersoy","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Michael","family":"Spertus","sequence":"additional","affiliation":[{"name":"Symantec Corporation mike"}]},{"given":"Michael","family":"Hart","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Daniel","family":"Kats","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Matteo","family":"Dell'Amico","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Robert","family":"Scott","sequence":"additional","affiliation":[{"name":"Symantec Corporation"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2017. Amazon S3. https:\/\/aws.amazon.com\/s3\/. (2017). Accessed: 2017-06-08.  Amazon. 2017. Amazon S3. https:\/\/aws.amazon.com\/s3\/. (2017). Accessed: 2017-06-08."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"An Introduction to Empirical Bayes Data Analysis","volume":"39","author":"Casella George","year":"1985","unstructured":"George Casella . 1985 . An Introduction to Empirical Bayes Data Analysis . The American Statistician 39 , 2 (May 1985), 83--87. George Casella. 1985. An Introduction to Empirical Bayes Data Analysis. The American Statistician 39, 2 (May 1985), 83--87.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_5_1","volume-title":"Computer Security Incident Handling Guide. NIST Special Publication 800-61 Rev 2 (August","author":"Cichonski Paul","year":"2012","unstructured":"Paul Cichonski , Tom Millar , Tim Grance , and Karen Scarfone . 2012. Computer Security Incident Handling Guide. NIST Special Publication 800-61 Rev 2 (August 2012 ). Paul Cichonski, Tom Millar, Tim Grance, and Karen Scarfone. 2012. Computer Security Incident Handling Guide. NIST Special Publication 800-61 Rev 2 (August 2012)."},{"key":"e_1_3_2_1_6_1","volume-title":"International Joint Conference on Artificial Intelligence (IJCAI).","author":"Ciresan Dan Claudiu","year":"2011","unstructured":"Dan Claudiu Ciresan , Ueli Meier , Jonathan Masci , Luca Maria Gambardella , and J\u00fcrgen Schmidhuber . 2011 . Flexible, high performance convolutional neural networks for image classification . In International Joint Conference on Artificial Intelligence (IJCAI). Dan Claudiu Ciresan, Ueli Meier, Jonathan Masci, Luca Maria Gambardella, and J\u00fcrgen Schmidhuber. 2011. Flexible, high performance convolutional neural networks for image classification. In International Joint Conference on Artificial Intelligence (IJCAI)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.276"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.233"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368332"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053103"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.284"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"e_1_3_2_1_15_1","volume-title":"ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models. arXiv preprint arXiv:1704.01942","author":"Kahng Minsuk","year":"2017","unstructured":"Minsuk Kahng , Pierre Andrews , Aditya Kalro , and Duen Horng Chau . 2017. ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models. arXiv preprint arXiv:1704.01942 ( 2017 ). Minsuk Kahng, Pierre Andrews, Aditya Kalro, and Duen Horng Chau. 2017. ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models. arXiv preprint arXiv:1704.01942 (2017)."},{"key":"e_1_3_2_1_16_1","volume-title":"Denial of Service: How Businesses Evaluate the Threat of DDoS Attacks. IT Security Risks Special Report Series (September","author":"Lab Kaspersky","year":"2015","unstructured":"Kaspersky Lab . 2015. Denial of Service: How Businesses Evaluate the Threat of DDoS Attacks. IT Security Risks Special Report Series (September 2015 ), 7. Kaspersky Lab. 2015. Denial of Service: How Businesses Evaluate the Threat of DDoS Attacks. IT Security Risks Special Report Series (September 2015), 7."},{"key":"e_1_3_2_1_17_1","unstructured":"MIT Lincoln Laboratory. 2000. DARPA Intrusion Detection Scenario Specific Data Sets. https:\/\/www.ll.mit.edu\/ideval\/data\/2000data.html. (2000).  MIT Lincoln Laboratory. 2000. DARPA Intrusion Detection Scenario Specific Data Sets. https:\/\/www.ll.mit.edu\/ideval\/data\/2000data.html. (2000)."},{"volume-title":"International Symposium on Security and Privacy (SP)","author":"Lindqvist Ulf","key":"e_1_3_2_1_18_1","unstructured":"Ulf Lindqvist and Phillip A. Porras . 1999. Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) . In International Symposium on Security and Privacy (SP) . Oakland, CA. Ulf Lindqvist and Phillip A. Porras. 1999. Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In International Symposium on Security and Privacy (SP). Oakland, CA."},{"key":"e_1_3_2_1_19_1","volume-title":"Security Information and Event Management (SIEM) Implementation","author":"Miller David","unstructured":"David Miller , Shon Harris , Allen Harper , Stephen VanDyke , and Chris Blask . 2010. Security Information and Event Management (SIEM) Implementation ( 1 st ed.). McGraw Hill Education . David Miller, Shon Harris, Allen Harper, Stephen VanDyke, and Chris Blask. 2010. Security Information and Event Management (SIEM) Implementation (1st ed.). McGraw Hill Education.","edition":"1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.98"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014135"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.01.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754710"},{"key":"e_1_3_2_1_24_1","volume-title":"Zargar","author":"Sadighian Alireza","year":"2014","unstructured":"Alireza Sadighian , Jos\u00e9 M. Fernandez , Antoine Lemay , and Saman T . Zargar . 2014 . ONTIDS : A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. Springer International Publishing , Cham, 161--177. Alireza Sadighian, Jos\u00e9 M. Fernandez, Antoine Lemay, and Saman T. Zargar. 2014. ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. Springer International Publishing, Cham, 161--177."},{"volume-title":"2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). 1--6.","author":"Sadighian A.","key":"e_1_3_2_1_25_1","unstructured":"A. Sadighian , S. T. Zargar , J. M. Fernandez , and A. Lemay . 2013. Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems . In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). 1--6. A. Sadighian, S. T. Zargar, J. M. Fernandez, and A. Lemay. 2013. Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems. In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). 1--6."},{"key":"e_1_3_2_1_26_1","volume-title":"Fusing Intrusion Data for Detection and Containment. In IEEE Military Communications Conference (MILCOM)","author":"Shankar Mallikarjun","year":"2003","unstructured":"Mallikarjun Shankar , Nageswara Rao , and Stephen Batsell . 2003 . Fusing Intrusion Data for Detection and Containment. In IEEE Military Communications Conference (MILCOM) . Ontario, Canada. Mallikarjun Shankar, Nageswara Rao, and Stephen Batsell. 2003. Fusing Intrusion Data for Detection and Containment. In IEEE Military Communications Conference (MILCOM). Ontario, Canada."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117461"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_3_2_1_29_1","volume-title":"Probabilistic Alert Correlation. In International Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Valdes Alfonso","year":"2001","unstructured":"Alfonso Valdes and Keith Skinner . 2001 . Probabilistic Alert Correlation. In International Symposium on Recent Advances in Intrusion Detection (RAID) . Davis, CA. Alfonso Valdes and Keith Skinner. 2001. Probabilistic Alert Correlation. In International Symposium on Recent Advances in Intrusion Detection (RAID). Davis, CA."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"e_1_3_2_1_32_1","volume-title":"NIPS Workshop on Deep Learning and Unsupervised Feature Learning","volume":"1","author":"Vanhoucke Vincent","year":"2011","unstructured":"Vincent Vanhoucke , Andrew Senior , and Mark Z Mao . 2011 . Improving the speed of neural networks on CPUs . In NIPS Workshop on Deep Learning and Unsupervised Feature Learning , Vol. 1 . 4. Vincent Vanhoucke, Andrew Senior, and Mark Z Mao. 2011. Improving the speed of neural networks on CPUs. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning, Vol. 1. 4."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128835"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"volume-title":"USENIX conference on Networked Systems Design and Implementation (NSDI).","author":"Zaharia Matei","key":"e_1_3_2_1_35_1","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauley , Michael J Franklin , Scott Shenker , and Ion Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In USENIX conference on Networked Systems Design and Implementation (NSDI). Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J Franklin, Scott Shenker, and Ion Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In USENIX conference on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23525-7_37"},{"key":"e_1_3_2_1_37_1","volume-title":"SocialImpact: Systematic Analysis of Underground Social Dynamics. In European Symposium on Research in Computer Security (ESORICS).","author":"Zhao Ziming","year":"2012","unstructured":"Ziming Zhao , Gail-Joon Ahn , Hongxin Hu , and Deepinder Mahi . 2012 . SocialImpact: Systematic Analysis of Underground Social Dynamics. In European Symposium on Research in Computer Security (ESORICS). Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, and Deepinder Mahi. 2012. SocialImpact: Systematic Analysis of Underground Social Dynamics. In European Symposium on Research in Computer Security (ESORICS)."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134645","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134645"}},"subtitle":["Cross-Product Intrusion Detection With Weak Indicators"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":36,"alternative-id":["10.1145\/3134600.3134645","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134645","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}