{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:42:02Z","timestamp":1729611722581,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/uksim.2010.110","type":"proceedings-article","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T18:24:28Z","timestamp":1276626268000},"page":"573-578","source":"Crossref","is-referenced-by-count":0,"title":["Cooperative Alert-Filers for Network Surveillance"],"prefix":"10.1109","author":[{"given":"Joshua Ojo","family":"Nehinbe","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Intrusion detection: A survey","year":"2005","author":"aleksandar","key":"ref10"},{"key":"ref11","article-title":"Improving the quality of alerts with correlation in intrusion detection","volume":"7","author":"fatima","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.04.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.097"},{"key":"ref14","first-page":"66","article-title":"A Rule-Based Temporal Alert Correlation System","volume":"5","author":"kabiril","year":"2007","journal-title":"International Journal of Network Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586144"},{"key":"ref16","article-title":"Intrusion Alert Correlation Technique Analysis for Heterogeneous Log","volume":"8","author":"yusof","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"article-title":"Network Security Laboratory","year":"2006","author":"sadoddin","key":"ref17"},{"article-title":"Snort: IDS and IPS Toolkit","year":"2007","author":"alder","key":"ref18"},{"article-title":"Alarm Reduction and Correlation in Intrusion Detection Systems","year":"2004","author":"chyssler","key":"ref19"},{"journal-title":"DARPA intrusion detection scenario specific datasets","year":"2009","key":"ref4"},{"journal-title":"CTFC (Capture the Flag Contest) Defcon Datasets","year":"2009","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004372"},{"article-title":"Correlation of Intrusion Alarms with Subjective Logic","year":"2001","author":"svensson","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","article-title":"Aggregation and correlation of intrusion detection alerts","author":"debar","year":"2001","journal-title":"Proceedings of International Symposium on Recent Advances in Intrusion Detection"},{"article-title":"Intrusion Detection Likelihood: A Risk-Based Approach","year":"2008","author":"hartsein","key":"ref2"},{"key":"ref9","article-title":"Guide to Intrusion Detection and Prevention Systems (IDPS)","author":"scarfone","year":"2007","journal-title":"Recommendations of the National Institute of Standards and Technology Special Publication 800-94"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-36084-0_7","article-title":"M2D2: “A formal data model for IDS alerts correlation","author":"morin","year":"2002","journal-title":"Recent Advances in Intrusion Detection (RAID2002)"},{"article-title":"Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection","year":"2007","author":"pietraszek","key":"ref20"},{"article-title":"Considerations and Pitfalls for Conducting Intrusion Detection Research","year":"2007","author":"paxson","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30108-0_27","article-title":"Discovering Novel Attack Strategies from INFOSEC Alerts","author":"qin","year":"2004"},{"article-title":"Intrusion Detection Alarm Correlation: A Survey","year":"2004","author":"urko","key":"ref24"},{"key":"ref23","first-page":"54","article-title":"Probabilistic alert correlation","author":"alfonso","year":"2001","journal-title":"Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"article-title":"Alert Correlation for Extracting Attack Strategies","year":"2006","author":"bin","key":"ref25"}],"event":{"name":"2010 12th International Conference on Computer Modelling and Simulation","start":{"date-parts":[[2010,3,24]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2010,3,26]]}},"container-title":["2010 12th International Conference on Computer Modelling and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5479086\/5480262\/05481049.pdf?arnumber=5481049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:52:59Z","timestamp":1602690779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5481049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/uksim.2010.110","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}