{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:37:28Z","timestamp":1725543448825},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367079"},{"type":"electronic","value":"9783540368601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11802372_97","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T10:26:36Z","timestamp":1153736796000},"page":"801-806","source":"Crossref","is-referenced-by-count":3,"title":["FPGA Based Intrusion Detection System Against Unknown and Known Attacks"],"prefix":"10.1007","author":[{"given":"Dong-Ho","family":"Kang","sequence":"first","affiliation":[]},{"given":"Byoung-Koo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jin-Tae","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Taek-Yong","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Jong-Soo","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"97_CR1","unstructured":"BoSong, Ye, M., Li, J.: Intrusion Detection Technology Research based High-speed Network. In: IEEE PDCAT 2003 Proceedings (2003)"},{"key":"97_CR2","unstructured":"Enterasys Networks: Intrusion Detection Methodologies Demystified (2003)"},{"key":"97_CR3","unstructured":"Kim, B.-K., Jang, J.-S., Sohn, S.-W., Chung, T.M.: Design and Implementation of Intrusion Detection System base on Object-Oriented Modeling. In: Proceedings of the International Conference on Security and Management (2002)"},{"key":"97_CR4","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)"},{"key":"97_CR5","unstructured":"Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA 1999 Conference (1999)"},{"key":"97_CR6","unstructured":"Ranum, M.: Burglar Alarms for Detecting Intrusions. NFR Inc (1999)"},{"key":"97_CR7","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th National Computer Security Conference (1994)"},{"key":"97_CR8","volume-title":"TCP\/IP Illustrated Volume I: The Protocols","author":"W. Richard Stevens","year":"1994","unstructured":"Richard Stevens, W.: TCP\/IP Illustrated Volume I: The Protocols. Addison-Wesley, Reading (1994)"},{"key":"97_CR9","doi-asserted-by":"crossref","unstructured":"Schuehler, D.V., Moscola, J., Lockwood, J.: Architecture for a hardware based, TCP\/IP content scanning system, IEEE HOTI (2003)","DOI":"10.1109\/MM.2004.1269000"},{"key":"97_CR10","doi-asserted-by":"crossref","unstructured":"Kim, B.-K., Kim, I.-K., Kim, K.-Y., Jang, J.-S.: Design and Implementation of High Performance Intrusion Detection System. ICCSA (2004)","DOI":"10.1007\/978-3-540-24768-5_63"},{"key":"97_CR11","unstructured":"Check Point Software Technologies: Multi-Layer Security: Attack Prevention Safeguards and Attacks Blocked, http:\/\/cgi.us.checkpoint.com\/securitycenter\/whitepapers.asp"},{"key":"97_CR12","volume-title":"Symosium on Applied Computing (SAC)","author":"C. Krugel","year":"2002","unstructured":"Krugel, C., Toth, T., Kirda, E.: Service Specific Anomaly Detection for Network Intrusion Detection. In: Symosium on Applied Computing (SAC), ACM Scientific Press, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Agent Computing and Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11802372_97.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:12:37Z","timestamp":1605643957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11802372_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367079","9783540368601"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11802372_97","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}