{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:40:51Z","timestamp":1725378051423},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2004,9]]},"DOI":"10.1007\/bf03179711","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"1072-1091","source":"Crossref","is-referenced-by-count":1,"title":["Utilisation de la corr\u00e9lation pond\u00e9r\u00e9e dans un processus de d\u00e9tection d\u2019intrusions","On the use of weighted correlation in intrusion detection process"],"prefix":"10.1007","volume":"59","author":[{"given":"Fabien","family":"Autrel","sequence":"first","affiliation":[]},{"given":"Salem","family":"Benferhat","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03179711_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CCOL0521360552","volume-title":"Axioms of Cooperative Decision Making","author":"H. Moulin","year":"1988","unstructured":"Moulin (H.), Axioms of Cooperative Decision Making,Cambridge University Press, Cambridge, 1988."},{"key":"BF03179711_CR2","volume-title":"Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection (raid\u201998)","author":"M. Hung","year":"1998","unstructured":"Hung (M.), A Large-scale Distributed Intrusion Detection Frame-work Based on Attack Strategy Analysis,Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection (raid\u201998), Louvain-La-Neuve, Belgium, 1998."},{"key":"BF03179711_CR3","unstructured":"M\u00e9 (L.),Marrakchi (Z.),Michel (C.),Debar (H.),Cuppens (F.), La d\u00e9tection d\u2019intrusion: les outils doivent coop\u00e9rer,revue de l\u2019\u00e9lectricit\u00e9 et de l\u2019\u00e9lectronique, no 5, pp. 50\u201355, mai 2001."},{"key":"BF03179711_CR4","doi-asserted-by":"crossref","unstructured":"Cuppens (F.),Ortalo (R.),Lambda: A language to model a database for detection of attacks,Third International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192000), pp. 197\u2013206, Toulouse, France, October 2000.","DOI":"10.1007\/3-540-39945-3_13"},{"key":"BF03179711_CR5","doi-asserted-by":"crossref","unstructured":"Valdes (A.) andSkinner (K.), Probabilistic Alert Correlation,Fourth International Workshop on the Recent Advances in Intrusion Detection (raid\u20192001), pp. 54\u201368, Davis,usa, October 2001.","DOI":"10.1007\/3-540-45474-8_4"},{"key":"BF03179711_CR6","unstructured":"Dam (O.)and Cunningham (R.), Building Scenarios from a Heterogeneous Alert Stream,proceedings of the 2001 ieee, Workshop on Information Assurance and Security, pp. 85\u2013103, United States Military Academy, West Point, NY, 5\u20136 June 2001."},{"key":"BF03179711_CR7","doi-asserted-by":"crossref","unstructured":"Debar (H.) andWespi (A.), The Intrusion Detection Console Correlation Mechanism,Workshop on the Recent Advances in Intrusion Detection (raid\u20192001), Davis,usa, October 2001.","DOI":"10.1007\/3-540-39945-3"},{"key":"BF03179711_CR8","doi-asserted-by":"crossref","unstructured":"Geib (C.) andGoldman (R.), Plan Recognition in Intrusion Detection Systems,darpa Information Survivability Conference and Exposition (discex), pp. 46\u201355, Anaheim,usa, June 2001.","DOI":"10.1109\/DISCEX.2001.932191"},{"key":"BF03179711_CR9","unstructured":"Geib (C.) andGoldman (R.), Probabilistic Plan Recognition for Hostile Agents,Florida ai Research Symposium (flair), Key-West,usa, 2001."},{"key":"BF03179711_CR10","unstructured":"Cuppens (F.), Managing alerts in a multi-intrusion detection detection environment,17th Annual Computer Security Applications Conference, pp. 22\u201332, New Orleans, Louisiana, December 10\u201314, 2001."},{"key":"BF03179711_CR11","doi-asserted-by":"crossref","unstructured":"Morin (B.),M\u00e9 (L.),Debar (H.),Ducass\u00e9 (M.),m2d2: A Formal Data Model forids Alert Correlation,Recent Advances in Intrusion Detection, 5th International Symposium, raid 2002, pp. 115\u2013127, Zurich, Switzerland, October 16\u201318, 2002.","DOI":"10.1007\/3-540-36084-0_7"},{"key":"BF03179711_CR12","unstructured":"Cuppens (F.) and Mi\u00e8ge(A.), Alert Correlation in a Cooperative Intrusion Detection Framework,ieee Symposium on Security and Privacy, pp. 202\u2013215, Oakland,usa, 2002."},{"key":"BF03179711_CR13","first-page":"806","volume":"87","author":"F. Cuppens","year":"2002","unstructured":"Cuppens (F.),Autrel (F.),Mi\u00e8ge (A.),Benferliat (S.), Recognizing malicious intention in an intrusion detection process,Second International Conference on Hybrid Intelligent Systems (his\u20192002),87, pp. 806\u2013817, Santiago, Chile, October 2002.","journal-title":"Second International Conference on Hybrid Intelligent Systems (his\u20192002)"},{"key":"BF03179711_CR14","unstructured":"Sheyner (O.), Haines (J.), Jha (S.), Lippmann (R.) and Wing (J.), Automated Generation and Analysis of Attack Graphs,2002 ieee Symposium on Security and Privacy, page 273, Berkeley, California, May 2002."},{"key":"BF03179711_CR15","doi-asserted-by":"crossref","unstructured":"Ning (P.),Cui (Y.) andReeves (D.), Constructing Attack Scenarios Through Correlation of Intrusion Alerts,proceedings of the 9th acm conference on Computer and communication security, pp. 245\u2013254, Washingtondc, usa, 2002.","DOI":"10.1145\/586110.586144"},{"key":"BF03179711_CR16","doi-asserted-by":"crossref","unstructured":"Ning (P.),Xu (D.), Learning Attack Strategies from Intrusion Alerts,proceedings of the 10th acm conference on Computer and communication security, pp. 200\u2013209, Washingtondc, usa, 2003.","DOI":"10.1145\/948109.948137"},{"key":"BF03179711_CR17","first-page":"359","volume":"23","author":"H. Debar","year":"2004","unstructured":"Debar (H.),Morin (B.),Cuppens (F.),Autrel (F.),M\u00e9 (L.),Vivinis (B.),Benferhat (S.),Ducass\u00e9 (M.),Ortalo (R.), D\u00e9tection d\u2019intrusions: corr\u00e9lation d\u2019alertes,Revue tsi, S\u00e9curit\u00e9 informatique,23, pp. 359\u2013390, 2004.","journal-title":"Revue tsi, S\u00e9curit\u00e9 informatique"}],"container-title":["Annales des T\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179711.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03179711\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179711.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T14:34:32Z","timestamp":1725374072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03179711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9]]},"references-count":17,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2004,9]]}},"alternative-id":["BF03179711"],"URL":"https:\/\/doi.org\/10.1007\/bf03179711","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2004,9]]}}}