{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:58:13Z","timestamp":1729616293052,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/uksim.2012.122","type":"proceedings-article","created":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T14:52:11Z","timestamp":1338562331000},"page":"223-228","source":"Crossref","is-referenced-by-count":0,"title":["A Forensic Model for Forecasting Alerts Workload and Patterns of Intrusions"],"prefix":"10.1109","author":[{"given":"Joshua Ojo","family":"Nehinbe","sequence":"first","affiliation":[]},{"given":"Johnson Ige","family":"Nehibe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Statistical Causality of INFOSEC Alert Data","author":"qin","year":"0","journal-title":"Recent Advances in Intrusion Detection 2003"},{"journal-title":"Network Security Essentials Applications and Standards","year":"2011","author":"stallings","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-917-2"},{"journal-title":"Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort Apache MySQL PHP and ACID","year":"2003","author":"rehman","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-642-02617-1_30","article-title":"Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average","author":"kim","year":"2009","journal-title":"Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance"},{"journal-title":"IDGraphs Intrusion Detection and Analysis Using Histographs","year":"2005","author":"ren","key":"11"},{"key":"12","article-title":"Intrusion Alert Correlation Technique Analysis for Heterogeneous Log","volume":"8","author":"yusof","year":"2008","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"journal-title":"Computer Security Art and Science","year":"2003","author":"bishop","key":"3"},{"journal-title":"Snort IDS and IPS Toolkit","year":"2007","author":"alder","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_2"},{"journal-title":"Guide to intrusion detection and prevention systems (IDPS)","year":"2007","author":"scarfone","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","article-title":"Aggregation and Correlation of Intrusion-Detection Alerts","author":"debar","year":"2001","journal-title":"Proc Int'l Symp Recent Advances in Intrusion Detection"},{"journal-title":"Design and Analysis of Time-Series Experiments","year":"2008","author":"glass","key":"6"},{"journal-title":"DARPA intrusion detection scenario specific datasets","year":"0","key":"5"},{"journal-title":"CTFC (Capture the Flag Contest) Defcon Datasets","year":"0","key":"4"},{"journal-title":"Methods for Reducing Workload during Investigations of Intrusion Logs","year":"2011","author":"nehinbe","key":"9"},{"key":"8","article-title":"Time Series Modeling for IDS Alert Management","author":"viinikka","year":"0","journal-title":"Proceedings of the ACM Symposium on InformAtion Computer and Communications Security (AsiaCCS) March 2006"}],"event":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation (UKSim)","start":{"date-parts":[[2012,3,28]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 UKSim 14th International Conference on Computer Modelling and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6204158\/6205428\/06205453.pdf?arnumber=6205453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:35:18Z","timestamp":1497972918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6205453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/uksim.2012.122","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}