{"id":"https://openalex.org/W1929875843","doi":"https://doi.org/10.1007/978-3-319-11379-1_19","title":"On Emulation-Based Network Intrusion Detection Systems","display_name":"On Emulation-Based Network Intrusion Detection Systems","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W1929875843","doi":"https://doi.org/10.1007/978-3-319-11379-1_19","mag":"1929875843"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-11379-1_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-11379-1_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003448580","display_name":"Ali Abbasi","orcid":"https://orcid.org/0000-0003-4220-6560"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Ali Abbasi","raw_affiliation_strings":["Services, Cyber security and Safety Group, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Services, Cyber security and Safety Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051083669","display_name":"Jos Wetzels","orcid":"https://orcid.org/0009-0003-8567-197X"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jos Wetzels","raw_affiliation_strings":["Eindhoven University of Technology, The Netherlands","Services, Cyber security and Safety Group, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Services, Cyber security and Safety Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006018926","display_name":"Wouter Bokslag","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Wouter Bokslag","raw_affiliation_strings":["Eindhoven University of Technology, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073853248","display_name":"Emmanuele Zambon","orcid":"https://orcid.org/0000-0002-8079-4087"},"institutions":[{"id":"https://openalex.org/I4210158840","display_name":"SecurityMatters (Netherlands)","ror":"https://ror.org/034hr8t11","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210158840"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Emmanuele Zambon","raw_affiliation_strings":["SecurityMatters BV, The Netherlands","Services, Cyber security and Safety Group, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"SecurityMatters BV, The Netherlands","institution_ids":["https://openalex.org/I4210158840"]},{"raw_affiliation_string":"Services, Cyber security and Safety Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052389888","display_name":"Sandro Etalle","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Sandro Etalle","raw_affiliation_strings":["Eindhoven University of Technology, The Netherlands","Services, Cyber security and Safety Group, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Services, Cyber security and Safety Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003448580"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":6.3223,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.9694172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"384","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.9426816701889038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8449087738990784},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7469930052757263},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.5193720459938049},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5133528113365173},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4104484021663666},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.38222140073776245},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38182830810546875},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2607303261756897},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2524799704551697},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2317177653312683}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.9426816701889038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8449087738990784},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7469930052757263},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.5193720459938049},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5133528113365173},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4104484021663666},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.38222140073776245},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38182830810546875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2607303261756897},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2524799704551697},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2317177653312683},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1007/978-3-319-11379-1_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-11379-1_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:publications/08838ced-fd87-4f01-9281-a05e40a8da49","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/08838ced-fd87-4f01-9281-a05e40a8da49","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Abbasi, A, Wetzels, J, Bokslag, W, Zambon, E & Etalle, S 2014, On emulation-based network intrusion detection systems. in A Stavrou, H Bos & G Portokalidis (eds), Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings). Lecture Notes in Computer Science, vol. 8688, Springer, Berlin, pp. 384-404, conference; 17th International Symposium on Research in Attacks, Intrusions and Defenses; 2014-09-17; 2014-09-19, 17/09/14. https://doi.org/10.1007/978-3-319-11379-1_19","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/6792832d-67ff-4665-950a-ab13566e7be1","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/6792832d-67ff-4665-950a-ab13566e7be1","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Abbasi, A, Wetzel, J, Bokslag, W, Zambon, E & Etalle, S 2014, On Emulation-Based Network Intrusion Detection Systems. in Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Lecture Notes in Computer Science, vol. 8688, Springer, Switzerland, pp. 384-404. https://doi.org/10.1007/978-3-319-11379-1_19","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:780881","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=780881","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:780881","is_oa":false,"landing_page_url":"http://repository.tue.nl/780881","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:ris.utwente.nl:publications/6792832d-67ff-4665-950a-ab13566e7be1","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/08838ced-fd87-4f01-9281-a05e40a8da49","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/08838ced-fd87-4f01-9281-a05e40a8da49","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings), 384 - 404","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W78162143","https://openalex.org/W102746433","https://openalex.org/W172558989","https://openalex.org/W1498464392","https://openalex.org/W1515653707","https://openalex.org/W1532737054","https://openalex.org/W1591237315","https://openalex.org/W1632088469","https://openalex.org/W1761672165","https://openalex.org/W1791341372","https://openalex.org/W1946174678","https://openalex.org/W1982829328","https://openalex.org/W2010440413","https://openalex.org/W2060276266","https://openalex.org/W2099804009","https://openalex.org/W2121468041","https://openalex.org/W2133217855","https://openalex.org/W2153649523","https://openalex.org/W2157912940","https://openalex.org/W2158302406","https://openalex.org/W3202272593","https://openalex.org/W4244461107","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3017054987","https://openalex.org/W2130418622","https://openalex.org/W2105847876","https://openalex.org/W2510612055","https://openalex.org/W2129209234","https://openalex.org/W2110890874","https://openalex.org/W2091999583","https://openalex.org/W2389505258","https://openalex.org/W2068061330","https://openalex.org/W1929875843"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
