{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:53:54Z","timestamp":1773615234271,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"3","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.3103\/s0146411617030026","type":"journal-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T01:07:45Z","timestamp":1501463265000},"page":"174-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The detection of Udpstorm attacks based on model checking linear temporal logic"],"prefix":"10.3103","volume":"51","author":[{"given":"Miaolei","family":"Deng","sequence":"first","affiliation":[]},{"given":"Kai","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Weijun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chunyan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"key":"6585_CR1","first-page":"220","volume-title":"Proc. 14th IEEE Workshop on Computer Security Foundations, IEEE Computer Society, Washington, DC","author":"M. Roger","year":"2001","unstructured":"Roger, M. and Goubault-Larrecq, J, Log auditing through model-checking, Proc. 14th IEEE Workshop on Computer Security Foundations, IEEE Computer Society, Washington, DC, 2001, pp. 220\u2013234."},{"key":"6585_CR2","first-page":"286","volume-title":"Proc. 17th International Conference on Computer Aided Verification, Lecture Notes in Computer Science, Scotland, UK","author":"J. Olivain","year":"2005","unstructured":"Olivain, J. and Goubault-Larrecq, J, The orchids intrusion detection tool, Proc. 17th International Conference on Computer Aided Verification, Lecture Notes in Computer Science, Scotland, UK, 2005, pp. 286\u2013290."},{"key":"6585_CR3","first-page":"1","volume-title":"Proc. 8th International Workshop, RV2008, Budapest","author":"J. Goubault-Larrecq","year":"2008","unstructured":"Goubault-Larrecq, J. and Olivain, J., A smell of orchids, Proc. 8th International Workshop, RV2008, Budapest, 2008, pp. 1\u201320."},{"issue":"3","key":"6585_CR4","first-page":"66","volume":"8","author":"Z. Weijun","year":"2011","unstructured":"Weijun, Z., Zhongyong, W., and Haibin, Z, Intrusion detection algorithm based on model checking interval temporal logic, China Commun., 2011, vol. 8, no. 3, pp. 66\u201372.","journal-title":"China Commun."},{"key":"6585_CR5","volume-title":"Math. Probl. Eng.","author":"Z. Weijun","year":"2013","unstructured":"Weijun, Z., Qinglei, Z., Weidong, Y., and Haibin, Z., A novel algorithm for intrusion detection based on rasl model checking, Math. Probl. Eng., 2013. doi 10.1155\/2013\/621203"},{"key":"6585_CR6","first-page":"1","volume-title":"Proc. 8th International Conference on New Technologies in Distributed Systems, New York","author":"R. Ben","year":"2008","unstructured":"Ben, R., Tremblay, G., and B\u00e9gin, G, Extending orchids for intrusion detection in 802.11 wireless networks, Proc. 8th International Conference on New Technologies in Distributed Systems, New York, 2008, pp. 1\u201312."},{"key":"6585_CR7","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A., et al., Model Checking (The MIT Press, London,1999)."},{"key":"6585_CR8","first-page":"1630","volume-title":"Proceedings of the International Conference on Machine Learning and Cybernetics","author":"M.G. Ouyang","year":"2003","unstructured":"Ouyang, M.G., Pan, F., and Zhang, Y.T., ISITL: Intrusion signatures in augmented interval temporal logic, Proceedings of the International Conference on Machine Learning and Cybernetics, 2003, pp. 1630\u20131635."},{"key":"6585_CR9","first-page":"22","volume-title":"Proceedings of the IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen","author":"N. Elzbieta","year":"2006","unstructured":"Elzbieta, N. and Marcin, Z, Modeling temporal properties of multi-event attack signatures in interval temporal logic, Proceedings of the IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen, 2006, pp. 22\u201331."},{"issue":"2","key":"6585_CR10","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/BF02907214","volume":"8","author":"M.G. Ouyang","year":"2003","unstructured":"Ouyang, M.G. and Zhou, Y.B., ISDTM: An intrusion signatures description temporal model, Wuhan Univ. J. Nat. Sci. A, 2003, vol. 8, no. 2, pp. 373\u2013378.","journal-title":"Wuhan Univ. J. Nat. Sci. A"},{"key":"6585_CR11","first-page":"806","volume-title":"Proc. 17th European Symposium on Research in Computer Security","author":"B. Philippe","year":"2012","unstructured":"Philippe, B., Isabelle, G., and Jean-Yves, M, Abstraction-based malware analysis using rewriting and model checking, Proc. 17th European Symposium on Research in Computer Security, 2012, pp. 806\u2013823."},{"issue":"4","key":"6585_CR12","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TDSC.2008.74","volume":"7","author":"K. Johannes","year":"2010","unstructured":"Johannes, K., Stefan, K., Christian, S., et al., Proactive detection of computer worms using model checking, IEEE Trans. Dependable Secure Comput., 2010, vol. 7, no. 4, pp. 424\u2013438.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6585_CR13","first-page":"416","volume-title":"Proc. 19th Int. Conf., TACAS 2013","author":"F. Song","year":"2013","unstructured":"Song, F. and Touili, T., LTL model-checking for malware detection, tools and algorithms for the construction and analysis of systems, Proc. 19th Int. Conf., TACAS 2013, 2013, pp. 416\u2013431."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617030026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617030026","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617030026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:57:12Z","timestamp":1773611832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617030026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["6585"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617030026","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]},"assertion":[{"value":"22 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}