{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:18Z","timestamp":1725751638700},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_10","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"145-152","source":"Crossref","is-referenced-by-count":1,"title":["Log File Analysis with Context-Free Grammars"],"prefix":"10.1007","author":[{"given":"Gregory","family":"Bosman","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Gruner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"S. Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, Technical Report, Department of Computer Science, Chalmers University, Goteborg, Sweden, 2000."},{"key":"10_CR2","first-page":"453","volume-title":"Model-Based Testing for Embedded Systems","author":"S. Gruner","year":"2011","unstructured":"S. Gruner and B. Watson, Model-based passive testing of safety-critical components, in Model-Based Testing for Embedded Systems, J. Zander, I. Schieferdecker and P. Mosterman (Eds.), CRC Press, Boca Raton, Florida, pp. 453\u2013483, 2011."},{"key":"10_CR3","volume-title":"Proceedings of the 2012 Military Communications Conference","author":"R. Harang","year":"2012","unstructured":"R. Harang and P. Guarino, Clustering of Snort alerts to identify patterns and reduce analyst workload, Proceedings of the 2012 Military Communications Conference, 2012."},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T. Lunt","year":"1993","unstructured":"T. Lunt, A survey of intrusion detection techniques, Computers and Security, vol. 12(4), pp. 405\u2013418, 1993.","journal-title":"Computers and Security"},{"key":"10_CR5","unstructured":"A. Memon, Log File Categorization and Anomaly Analysis Using Grammar Inference, M.S. Thesis, School of Computing, Queen\u2019s University, Kingston, Canada, 2008."},{"key":"10_CR6","first-page":"355","volume-title":"The Internet Encyclopedia, Volume 2","author":"P. Ning","year":"2004","unstructured":"P. Ning and S. Jajodia, Intrusion detection techniques, in The Internet Encyclopedia, Volume 2, H. Bidogli (Ed.), Wiley, Hoboken, New Jersey, pp. 355\u2013367, 2004."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0169-023X(02)00129-5","volume":"43","author":"M. Olivier","year":"2002","unstructured":"M. Olivier and E. Gudes, Wrappers: A mechanism to support state-based authorization in web applications, Data and Knowledge Engineering, vol. 43(3), pp. 281\u2013292, 2002.","journal-title":"Data and Knowledge Engineering"},{"key":"10_CR8","volume-title":"The Definitive ANTLR Reference: Building Domain-Specific Languages","author":"T. Parr","year":"2007","unstructured":"T. Parr, The Definitive ANTLR Reference: Building Domain-Specific Languages, Pragmatic Bookshelf, Raleigh, North Carolina, 2007."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection","author":"A. Valdez","year":"2001","unstructured":"A. Valdez and K. Skinner, Probabilistic alert correlation, Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection, pp. 54\u201368, 2001."},{"key":"10_CR10","volume-title":"Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research","author":"S. Zhang","year":"2006","unstructured":"S. Zhang, T. Dean and S. Knight, A lightweight approach to state-based security testing, Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, article no. 28, 2006."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T19:55:18Z","timestamp":1558122918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}