{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:01:47Z","timestamp":1729630907421,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.33","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"241-248","source":"Crossref","is-referenced-by-count":4,"title":["Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Yuxin","family":"Meng","sequence":"first","affiliation":[]},{"given":"Lam-for","family":"Kwok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"journal-title":"Snort the open source network intrusion detection system","year":"2012","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25658-5_68"},{"journal-title":"Weka waikato environment for knowledge analysis","year":"2012","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_36"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSA.2012.6269608"},{"key":"13","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-642-00909-9_42","article-title":"Adaptive alarm filtering by causal correlation consideration in intrusion detection","author":"lin","year":"2009","journal-title":"New Advan in Intel Decision Techno SCI 199"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"11","first-page":"114","article-title":"Ids false alarm filtering using knn classifier","author":"law","year":"2004","journal-title":"Proc Workshop Information Security Applications (WISA)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"21","first-page":"229","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 12th Usenix System Administration Conf"},{"key":"3","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/978-3-642-14400-4_46","article-title":"Semi-supervised learning for false alarm reduction","author":"chiu","year":"2010","journal-title":"Proceedings of the 10th Industrial Conference on Advances in Data Mining Applications and Theoretical Aspects"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_6"},{"key":"2","first-page":"1","article-title":"The base-rate fallacy and its implications for the difficulty of intrusion detection","author":"axelsson","year":"1999","journal-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS)"},{"key":"1","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/11496137_14","article-title":"Ids false alarm reduction using continuous and discontinuous patterns","author":"alharby","year":"2005","journal-title":"Proceedings of the 3rd International Conference on Applied Cryptography and Network Security (ACNS)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.9"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.008"},{"key":"6","first-page":"352","article-title":"Adaptive anomaly-based intrusion detection system using fuzzy controller","volume":"14","author":"geramiraz","year":"2012","journal-title":"International Journal of Network Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"},{"key":"9","first-page":"527","article-title":"Towards an information-theoretic framework for analyzing intrusion detection systems","author":"gu","year":"2006","journal-title":"Proceedings of the 11th European Conference on Research in Computer Security (ESORICS)"},{"key":"8","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1145\/1128817.1128834","article-title":"Measuring intrusion detection capability: An information-theoretic approach","author":"gu","year":"2006","journal-title":"Proceedings of the 2006 ACM Symposium on Information Computer and Communications Security (ASIACCS)"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680847.pdf?arnumber=6680847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T01:35:41Z","timestamp":1564968941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.33","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}