{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:32Z","timestamp":1750220312655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3474720","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On-premises Analysis of Advanced Threat Prevention Appliances"],"prefix":"10.1145","author":[{"given":"Akira","family":"Fujita","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Tao","family":"Ban","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Daisuke","family":"Inoue","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Adeeb Alhomoud Rashid Munir Jules\u00a0Pagna Disso Irfan Awan and A. Al-Dhelaan. 2011. Performance Evaluation Study of Intrusion Detection Systems. 5 (2011) 173\u2013180.  Adeeb Alhomoud Rashid Munir Jules\u00a0Pagna Disso Irfan Awan and A. Al-Dhelaan. 2011. Performance Evaluation Study of Intrusion Detection Systems. 5 (2011) 173\u2013180.","DOI":"10.1016\/j.procs.2011.07.024"},{"key":"e_1_3_2_1_2_1","unstructured":"Mark\u00a0Nicolett Amrit T.\u00a0Williams. 2005. Improve IT Security with Vulnerability Management.  Mark\u00a0Nicolett Amrit T.\u00a0Williams. 2005. Improve IT Security with Vulnerability Management."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Alexy Bhowmick and Shyamanta\u00a0M. Hazarika. 2018. E-Mail Spam Filtering: A Review of Techniques and Trends. (2018) 583\u2013590.  Alexy Bhowmick and Shyamanta\u00a0M. Hazarika. 2018. E-Mail Spam Filtering: A Review of Techniques and Trends. (2018) 583\u2013590.","DOI":"10.1007\/978-981-10-4765-7_61"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489237"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134617"},{"key":"e_1_3_2_1_6_1","unstructured":"The Open Information\u00a0Security Foundation. 2010. Suricata Open Source IDS\/IPS\/NSM engine. https:\/\/suricata-ids.org\/.  The Open Information\u00a0Security Foundation. 2010. Suricata Open Source IDS\/IPS\/NSM engine. https:\/\/suricata-ids.org\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Harm Griffioen Tim Booij and Christian Doerr. 2020. Quality Evaluation of Cyber Threat Intelligence Feeds. (2020) 277\u2013296.  Harm Griffioen Tim Booij and Christian Doerr. 2020. Quality Evaluation of Cyber Threat Intelligence Feeds. (2020) 277\u2013296.","DOI":"10.1007\/978-3-030-57878-7_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8137.1912.tb05611.x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23522"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of 28th USENIX Security Symposium (USENIX Security 19)","author":"Li Vector\u00a0Guo","year":"2019","unstructured":"Vector\u00a0Guo Li , Matthew Dunn , Paul Pearce , Damon McCoy , Geoffrey\u00a0 M. Voelker , Stefan Savage , and Kirill Levchenko . 2019 . Reading the Tea leaves: A Comparative Analysis of Threat Intelligence . In Proceedings of 28th USENIX Security Symposium (USENIX Security 19) . 851\u2013867. Vector\u00a0Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey\u00a0M. Voelker, Stefan Savage, and Kirill Levchenko. 2019. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. In Proceedings of 28th USENIX Security Symposium (USENIX Security 19). 851\u2013867."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.14.0309"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 7th Conference on USENIX Security Symposium.","author":"Paxson Vern","year":"1998","unstructured":"Vern Paxson . 1998 . Bro: A System for Detecting Network Intruders in Real-Time . In Proceedings of the 7th Conference on USENIX Security Symposium. Vern Paxson. 1998. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th Conference on USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 13th USENIX Conference on System. 229\u2013238","author":"Roesch Martin","year":"1999","unstructured":"Martin Roesch . 1999 . Snort - Lightweight Intrusion Detection for Networks . In Proceedings of the 13th USENIX Conference on System. 229\u2013238 . Martin Roesch. 1999. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System. 229\u2013238."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101734"},{"key":"e_1_3_2_1_20_1","unstructured":"Kenneth Tam Mart\u00edn Hoz Salvador Ken McAlpine Rick Basile Bruce Matsugu and Josh More. 2013. UTM Security with Fortinet. Syngress.  Kenneth Tam Mart\u00edn Hoz Salvador Ken McAlpine Rick Basile Bruce Matsugu and Josh More. 2013. UTM Security with Fortinet. Syngress."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2013.6718975"},{"key":"e_1_3_2_1_22_1","first-page":"2579","article-title":"Visualizing Data Using t-SNE","volume":"9","author":"van\u00a0der Maaten Laurens","year":"2008","unstructured":"Laurens van\u00a0der Maaten and Geoffrey Hinton . 2008 . Visualizing Data Using t-SNE . Journal of Machine Learning Research 9 (2008), 2579 \u2013 2605 . Laurens van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing Data Using t-SNE. Journal of Machine Learning Research 9 (2008), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_23_1","volume-title":"Toward a reliable anomaly-based intrusion detection in real-world environments. 127","author":"Viegas K.","year":"2017","unstructured":"Eduardo\u00a0 K. Viegas , Altair\u00a0 O. Santin , and Luiz\u00a0 S. Oliveira . 2017. Toward a reliable anomaly-based intrusion detection in real-world environments. 127 ( 2017 ), 200\u2013216. Eduardo\u00a0K. Viegas, Altair\u00a0O. Santin, and Luiz\u00a0S. Oliveira. 2017. Toward a reliable anomaly-based intrusion detection in real-world environments. 127 (2017), 200\u2013216."}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","acronym":"CSET '21","location":"Virtual CA USA"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":22,"alternative-id":["10.1145\/3474718.3474720","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3474720","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}