{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:09:14Z","timestamp":1729631354698,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/ccnc.2016.7444873","type":"proceedings-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T17:13:05Z","timestamp":1459444385000},"page":"752-758","source":"Crossref","is-referenced-by-count":1,"title":["Efficient tuning methodologies for a network payload anomaly inspection scheme"],"prefix":"10.1109","author":[{"given":"William","family":"Edmonds","sequence":"first","affiliation":[]},{"given":"Sun-il","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Erik","family":"MacIntyre","sequence":"additional","affiliation":[]},{"given":"Chockalingam","family":"Karuppanchetty","sequence":"additional","affiliation":[]},{"given":"Nnamdi","family":"Nwanze","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ISCC.2010.5546735"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"Anomalous payload-based network intrusion detection","volume":"3224","author":"wang","year":"2004","journal-title":"Proc 7th Int Symp Recent Advances in Intrusion Detection (RAID)"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/508791.508835"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/PCCC.2008.4745080"},{"key":"ref14","first-page":"376","article-title":"A lightweight tool for detecting web server attacks","author":"almgren","year":"2000","journal-title":"Proceedings of ISOC Symposium on Network and Distributed System Security Sein"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/3-540-45474-8_2"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/DASC.2014.79"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICOIN.2014.6799699"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/948143.948144"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-04342-0_2"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ISIAS.2010.5604048"},{"key":"ref4","article-title":"The nides statistical component: Description and justification","author":"javits","year":"1993","journal-title":"SRI Computer Science Laboratory Technical Report"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2602087.2602093"},{"key":"ref3","article-title":"Comparative evaluation of header vs. payload based network anomaly detectors","author":"cheema","year":"2009","journal-title":"World Congress on Engineering"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/775094.775102"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/775094.775102"},{"key":"ref8","first-page":"352","article-title":"Adaptive anomaly-based intrusion detection system using fuzzy controller","volume":"14","author":"geramiraz","year":"2012","journal-title":"International Journal of Security and Networks"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.5120\/2303-2914"},{"key":"ref2","first-page":"253","article-title":"On network intrusion detection for deployment in the wild","author":"kim","year":"2012","journal-title":"Network Operations and Management Symposium (NOMS) 2012 IEEE"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/32.372146"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/LCN.2008.4664303"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TSMCC.2010.2048428"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/HPCC.2012.235"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ANCS.2013.6665196"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/WAINA.2008.145"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/IranianCEE.2013.6599567"},{"key":"ref26","first-page":"494","article-title":"Genetic algorithm and artificial immune systems: A combinational approach for network intrusion detection","author":"sridevi","year":"2012","journal-title":"Advances in Engineering Science and Management (ICAESM) 2012 International Conference on"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CSNT.2013.93"}],"event":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2016,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,1,12]]}},"container-title":["2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435634\/7440162\/7444873.pdf?arnumber=7444873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:45:57Z","timestamp":1498283157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7444873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2016.7444873","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}