{"id":"https://openalex.org/W1968562654","doi":"https://doi.org/10.1007/s00450-009-0055-y","title":"Network attack detection and defense \u2013 Manifesto of the Dagstuhl Perspective Workshop, March 2nd\u20136th, 2008","display_name":"Network attack detection and defense \u2013 Manifesto of the Dagstuhl Perspective Workshop, March 2nd\u20136th, 2008","publication_year":2009,"publication_date":"2009-02-23","ids":{"openalex":"https://openalex.org/W1968562654","doi":"https://doi.org/10.1007/s00450-009-0055-y","mag":"1968562654"},"language":"en","primary_location":{"id":"doi:10.1007/s00450-009-0055-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00450-009-0055-y","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs00450-009-0055-y.pdf","source":{"id":"https://openalex.org/S22130598","display_name":"Computer Science - Research and Development","issn_l":"1865-2034","issn":["1865-2034","1865-2042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science - Research and Development","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2Fs00450-009-0055-y.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060144977","display_name":"Georg Carle","orcid":"https://orcid.org/0000-0002-2347-1839"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Georg Carle","raw_affiliation_strings":["TU Muenchen, Munich, Germany","TU-Muenchen"],"affiliations":[{"raw_affiliation_string":"TU Muenchen, Munich, Germany","institution_ids":[]},{"raw_affiliation_string":"TU-Muenchen","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042212040","display_name":"Falko Dressler","orcid":"https://orcid.org/0000-0002-1989-1750"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Falko Dressler","raw_affiliation_strings":["University Erlangen-Nuremberg, Erlangen, Germany","University Erlangen Nuremberg"],"affiliations":[{"raw_affiliation_string":"University Erlangen-Nuremberg, Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]},{"raw_affiliation_string":"University Erlangen Nuremberg","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109057758","display_name":"Richard A. Kemmerer","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]},{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard A. Kemmerer","raw_affiliation_strings":["University of California, Santa Barbara, CA, USA","University of California"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, CA, USA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066926709","display_name":"Hartmut Koenig","orcid":null},"institutions":[{"id":"https://openalex.org/I51783024","display_name":"Brandenburg University of Technology Cottbus-Senftenberg","ror":"https://ror.org/02wxx3e24","country_code":"DE","type":"education","lineage":["https://openalex.org/I51783024"]},{"id":"https://openalex.org/I4210094170","display_name":"Landesamt f\u00fcr Soziales und Versorgung des Landes Brandenburg","ror":"https://ror.org/00fzeeb88","country_code":"DE","type":"government","lineage":["https://openalex.org/I4210094170"]},{"id":"https://openalex.org/I4210143701","display_name":"Carl-Thiem-Klinikum Cottbus","ror":"https://ror.org/044fhy270","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I4210143701"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hartmut Koenig","raw_affiliation_strings":["BTU Cottbus, LS RNKS, PF 101344, 03013, Cottbus, Germany, Germany","BTU Cottbus"],"affiliations":[{"raw_affiliation_string":"BTU Cottbus, LS RNKS, PF 101344, 03013, Cottbus, Germany, Germany","institution_ids":["https://openalex.org/I4210094170","https://openalex.org/I4210143701"]},{"raw_affiliation_string":"BTU Cottbus","institution_ids":["https://openalex.org/I51783024"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022177364","display_name":"Christopher Kruegel","orcid":"https://orcid.org/0000-0001-5140-3414"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christopher Kruegel","raw_affiliation_strings":["Technical University of Vienna, Vienna, Austria","Technical Univ. of Vienna#TAB#"],"affiliations":[{"raw_affiliation_string":"Technical University of Vienna, Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]},{"raw_affiliation_string":"Technical Univ. of Vienna#TAB#","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089735573","display_name":"Pavel Laskov","orcid":"https://orcid.org/0000-0002-3212-7167"},"institutions":[{"id":"https://openalex.org/I4923324","display_name":"Fraunhofer Society","ror":"https://ror.org/05hkkdn48","country_code":"DE","type":"funder","lineage":["https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Pavel Laskov","raw_affiliation_strings":["Fraunhofer Institute Berlin, Berlin, Germany","Fraunhofer Inst., Berlin"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute Berlin, Berlin, Germany","institution_ids":[]},{"raw_affiliation_string":"Fraunhofer Inst., Berlin","institution_ids":["https://openalex.org/I4923324"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060144977"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6857,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70463489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"23","issue":"1","first_page":"15","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/manifesto","display_name":"Manifesto","score":0.7801206707954407},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6703202128410339},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5465535521507263},{"id":"https://openalex.org/keywords/vision","display_name":"Vision","score":0.5463928580284119},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.526507556438446},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41730719804763794},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4172844886779785},{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.4169141948223114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41515052318573},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33851945400238037},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.29474082589149475},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1590506136417389},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.1087731122970581},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0999554693698883},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09328213334083557}],"concepts":[{"id":"https://openalex.org/C2778896172","wikidata":"https://www.wikidata.org/wiki/Q46337","display_name":"Manifesto","level":2,"score":0.7801206707954407},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6703202128410339},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5465535521507263},{"id":"https://openalex.org/C133979268","wikidata":"https://www.wikidata.org/wiki/Q1682108","display_name":"Vision","level":2,"score":0.5463928580284119},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.526507556438446},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41730719804763794},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4172844886779785},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.4169141948223114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41515052318573},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33851945400238037},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.29474082589149475},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1590506136417389},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.1087731122970581},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0999554693698883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09328213334083557},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s00450-009-0055-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00450-009-0055-y","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs00450-009-0055-y.pdf","source":{"id":"https://openalex.org/S22130598","display_name":"Computer Science - Research and Development","issn_l":"1865-2034","issn":["1865-2034","1865-2042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science - Research and Development","raw_type":"journal-article"},{"id":"pmh:oai:escholarship.org/ark:/13030/qt67x468kn","is_oa":false,"landing_page_url":"https://escholarship.org/uc/item/67x468kn","pdf_url":null,"source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science - Research and Development: Computer Science - Research and Development\\nOrgan der Fachbereiche Softwaretechnik, Datenbanken und Informationssysteme der Gesellschaft f\u00fcr Informatik e.V. (GI), vol 23, iss 1","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s00450-009-0055-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00450-009-0055-y","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs00450-009-0055-y.pdf","source":{"id":"https://openalex.org/S22130598","display_name":"Computer Science - Research and Development","issn_l":"1865-2034","issn":["1865-2034","1865-2042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science - Research and Development","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1968562654.pdf","grobid_xml":"https://content.openalex.org/works/W1968562654.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"This":[0],"manifesto":[1],"is":[2,180],"the":[3,6,26,34,36,45,72,117,119,125,130,138,157,160,162,178,190,198],"result":[4],"of":[5,25,47,74,121,127,132,136,140,159,177],"Perspective":[7],"Workshop":[8],"Network":[9],"Attack":[10],"Detection":[11],"and":[12,39,50,61,83,107,142,148,164],"Defense":[13],"held":[14],"in":[15,44,91,116,182,189],"Schloss":[16],"Dagstuhl":[17],"(Germany)":[18],"from":[19,30],"March":[20],"2nd\u20136th,":[21],"2008.":[22],"The":[23,53,95,109,175,193],"participants":[24,97],"workshop":[27,54,96,191],"represent":[28],"researchers":[29],"Austria,":[31],"France,":[32],"Norway,":[33],"Switzerland,":[35],"United":[37],"States,":[38],"Germany":[40],"who":[41],"work":[42],"actively":[43],"field":[46],"intrusion":[48,59,141],"detection":[49,60,73,82,106,144],"network":[51,75,104],"monitoring.":[52],"attendee\u2019s":[55],"opinion":[56],"was":[57],"that":[58],"flow":[62],"analysis,":[63],"which":[64,186],"have":[65],"been":[66],"developed":[67],"as":[68,114],"complementary":[69],"approaches":[70],"for":[71,145,169],"attacks,":[76,137],"should":[77],"more":[78],"strongly":[79],"combine":[80],"event":[81],"correlation":[84],"techniques":[85],"to":[86,101,153,200],"better":[87],"meet":[88],"future":[89,92,103],"challenges":[90],"reactive":[93],"security.":[94],"considered":[98],"various":[99],"perspectives":[100],"envision":[102],"attack":[105],"defense.":[108],"following":[110],"topics":[111],"are":[112,187],"seen":[113],"important":[115],"future:":[118],"development":[120],"early":[122],"warning":[123],"systems,":[124],"introduction":[126],"situation":[128],"awareness,":[129],"improvement":[131],"measurement":[133],"technology,":[134],"taxonomy":[135],"application":[139],"fraud":[143],"web":[146],"services,":[147],"anomaly":[149],"detection.":[150],"In":[151],"order":[152],"realize":[154],"those":[155],"visions":[156],"state":[158],"art,":[161],"challenges,":[163],"research":[165],"priorities":[166],"were":[167,195],"identified":[168],"each":[170],"topic":[171],"by":[172,197],"working":[173,183],"groups.":[174],"outcome":[176],"discussion":[179],"summarized":[181],"group":[184],"papers":[185,194],"published":[188],"proceedings.":[192],"compiled":[196],"editors":[199],"this":[201],"manifesto.":[202]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
