{"id":"https://openalex.org/W2105847876","doi":"https://doi.org/10.1007/978-3-642-20305-3_18","title":"Anti-evasion Technique for Packet Based Pre-filtering for Network Intrusion Detection Systems (Poster)","display_name":"Anti-evasion Technique for Packet Based Pre-filtering for Network Intrusion Detection Systems (Poster)","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2105847876","doi":"https://doi.org/10.1007/978-3-642-20305-3_18","mag":"2105847876"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-20305-3_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-20305-3_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010562631","display_name":"Salvatore Pontarelli","orcid":"https://orcid.org/0000-0002-3626-6404"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]},{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Salvatore Pontarelli","raw_affiliation_strings":["Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \u201cTor Vergata\u201d, Via del Politecnico 1, 00133, Rome, Italy","Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \"Tor Vergata\", Via del Politecnico 1, 00133, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \u201cTor Vergata\u201d, Via del Politecnico 1, 00133, Rome, Italy","institution_ids":["https://openalex.org/I4210099310","https://openalex.org/I116067653"]},{"raw_affiliation_string":"Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \"Tor Vergata\", Via del Politecnico 1, 00133, Rome, Italy","institution_ids":["https://openalex.org/I4210099310","https://openalex.org/I116067653"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065799770","display_name":"Simone Teofili","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]},{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Simone Teofili","raw_affiliation_strings":["Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \u201cTor Vergata\u201d, Via del Politecnico 1, 00133, Rome, Italy","Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \"Tor Vergata\", Via del Politecnico 1, 00133, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \u201cTor Vergata\u201d, Via del Politecnico 1, 00133, Rome, Italy","institution_ids":["https://openalex.org/I4210099310","https://openalex.org/I116067653"]},{"raw_affiliation_string":"Consorzio Nazionale InterUniversitario per le Telecomunicazioni (CNIT), University of Rome \"Tor Vergata\", Via del Politecnico 1, 00133, Rome, Italy","institution_ids":["https://openalex.org/I4210099310","https://openalex.org/I116067653"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010562631"],"corresponding_institution_ids":["https://openalex.org/I116067653","https://openalex.org/I4210099310"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23014805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8666090369224548},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8452781438827515},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7826759815216064},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7443336248397827},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.6921597719192505},{"id":"https://openalex.org/keywords/packet-analyzer","display_name":"Packet analyzer","score":0.6156961917877197},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5064600706100464},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4833540618419647},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4648605287075043},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4121643304824829},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3957112431526184},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3930450677871704},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3797015845775604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3538530766963959},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2812238335609436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8666090369224548},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8452781438827515},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7826759815216064},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7443336248397827},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.6921597719192505},{"id":"https://openalex.org/C95362637","wikidata":"https://www.wikidata.org/wiki/Q54366","display_name":"Packet analyzer","level":3,"score":0.6156961917877197},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5064600706100464},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4833540618419647},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4648605287075043},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4121643304824829},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3957112431526184},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3930450677871704},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3797015845775604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3538530766963959},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2812238335609436},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-20305-3_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-20305-3_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.300.8937","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.8937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dftgroup.uniroma2.it/data/media/tma11-antievasion.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2096495947","https://openalex.org/W2117596867","https://openalex.org/W4237076376"],"related_works":["https://openalex.org/W2187090218","https://openalex.org/W2130558347","https://openalex.org/W2347581643","https://openalex.org/W2014429435","https://openalex.org/W90798297","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W3180789466","https://openalex.org/W2361755837","https://openalex.org/W2351448539"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
