On Emulation-Based Network Intrusion Detection Systems. Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. In Stavrou, A., Bos, H., & Portokalidis, G., editors, Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings, volume 8688, of Lecture Notes in Computer Science, pages 384–404, 2014. Springer. Paper doi bibtex @inproceedings{DBLP:conf/raid/AbbasiWBZE14,
author = {Ali Abbasi and
Jos Wetzels and
Wouter Bokslag and
Emmanuele Zambon and
Sandro Etalle},
editor = {Angelos Stavrou and
Herbert Bos and
Georgios Portokalidis},
title = {On Emulation-Based Network Intrusion Detection Systems},
booktitle = {Research in Attacks, Intrusions and Defenses - 17th International
Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8688},
pages = {384--404},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-11379-1\_19},
doi = {10.1007/978-3-319-11379-1\_19},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"oopTRRYDH864fCGQ9","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-onemulationbasednetworkintrusiondetectionsystems-2014","authorIDs":["8GDRtnKa7HgrEaB4z","AHBcZdsmHCWDgtpC7","DH5JdmwxHqaXbBvEA","SkaZcE3z5iJeCHkaJ","TfED66CoJYGCLZYuT","TjDPaZbFguW9SL9i4","YMq7twBerkTLPzjFA","ZuF937trtie4BQLu7","azQ52wqDwKz7CXhcT","exDrBuNqQrwcXC3at","f7jaSovysnJBH42jJ","khBkuJmWPrzrmvsuq"],"author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]},{"firstnames":["Jos"],"propositions":[],"lastnames":["Wetzels"],"suffixes":[]},{"firstnames":["Wouter"],"propositions":[],"lastnames":["Bokslag"],"suffixes":[]},{"firstnames":["Emmanuele"],"propositions":[],"lastnames":["Zambon"],"suffixes":[]},{"firstnames":["Sandro"],"propositions":[],"lastnames":["Etalle"],"suffixes":[]}],"editor":[{"firstnames":["Angelos"],"propositions":[],"lastnames":["Stavrou"],"suffixes":[]},{"firstnames":["Herbert"],"propositions":[],"lastnames":["Bos"],"suffixes":[]},{"firstnames":["Georgios"],"propositions":[],"lastnames":["Portokalidis"],"suffixes":[]}],"title":"On Emulation-Based Network Intrusion Detection Systems","booktitle":"Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings","series":"Lecture Notes in Computer Science","volume":"8688","pages":"384–404","publisher":"Springer","year":"2014","url":"https://doi.org/10.1007/978-3-319-11379-1\\_19","doi":"10.1007/978-3-319-11379-1_19","timestamp":"Sun, 02 Oct 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/raid/AbbasiWBZE14,\n author = {Ali Abbasi and\n Jos Wetzels and\n Wouter Bokslag and\n Emmanuele Zambon and\n Sandro Etalle},\n editor = {Angelos Stavrou and\n Herbert Bos and\n Georgios Portokalidis},\n title = {On Emulation-Based Network Intrusion Detection Systems},\n booktitle = {Research in Attacks, Intrusions and Defenses - 17th International\n Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.\n Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {8688},\n pages = {384--404},\n publisher = {Springer},\n year = {2014},\n url = {https://doi.org/10.1007/978-3-319-11379-1\\_19},\n doi = {10.1007/978-3-319-11379-1\\_19},\n timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"editor_short":["Stavrou, A.","Bos, H.","Portokalidis, G."],"key":"DBLP:conf/raid/AbbasiWBZE14","id":"DBLP:conf/raid/AbbasiWBZE14","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-onemulationbasednetworkintrusiondetectionsystems-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-11379-1\\_19"},"metadata":{"authorlinks":{"abbasi, a":"https://homepage.ruhr-uni-bochum.de/ali.abbasi-i4q/pub.html"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/73/2297-2.bib","creationDate":"2020-05-01T22:19:37.071Z","downloads":0,"keywords":[],"search_terms":["emulation","based","network","intrusion","detection","systems","abbasi","wetzels","bokslag","zambon","etalle"],"title":"On Emulation-Based Network Intrusion Detection Systems","year":2014,"dataSources":["mgBXxEwpGG6TrJ3nr","9RRnqWppvSHbtx7rD","7whi7meiPSmyTF8Y3","4ji2ftG9xHDRDPcZG","eqGZWjgQsJSxuxEGv"]}