{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:03:45Z","timestamp":1729634625628,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icdcsw.2013.7","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:36Z","timestamp":1387327596000},"page":"39-44","source":"Crossref","is-referenced-by-count":0,"title":["A Method to Automatically Filter Log Evidences for Intrusion Forensics"],"prefix":"10.1109","author":[{"given":"Jian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","first-page":"145","article-title":"The 1998 lincoln laboratory ids evaluation (a critique)","author":"mchugh","year":"2000","journal-title":"Proceedings of RAID 2000"},{"key":"1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.2298\/CSIS0501103H","article-title":"Fp-outlier: Frequent pattern based outlier detection","volume":"2","author":"he","year":"2005","journal-title":"Computer Science and Information System"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00138-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_10"},{"key":"5","first-page":"102","article-title":"Using adaptive alert classification to reduce false positives in intrusion detection","volume":"3224","author":"pietraszek","year":"2004","journal-title":"InRAID 2004 LNCS"},{"key":"4","first-page":"137","article-title":"Data reduction techniques for large data sets","author":"guest","year":"2008","journal-title":"Handbook for Team-Based Qualitative Research"},{"key":"9","article-title":"Snort: Ids and ips toolkit","author":"alder","year":"2007","journal-title":"Syngress Publishing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2010.5606495"}],"event":{"name":"2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)","start":{"date-parts":[[2013,7,8]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2013,7,11]]}},"container-title":["2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679588\/6679830\/06679860.pdf?arnumber=6679860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:26:34Z","timestamp":1498105594000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6679860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdcsw.2013.7","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}