{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T02:10:20Z","timestamp":1736475020677,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367079"},{"type":"electronic","value":"9783540368601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11802372_98","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T10:26:36Z","timestamp":1153736796000},"page":"807-812","source":"Crossref","is-referenced-by-count":1,"title":["Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks"],"prefix":"10.1007","author":[{"given":"Jun-Cheol","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Eun-Yeung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"98_CR1","volume-title":"Counter Hack","author":"E. Skoudis","year":"2002","unstructured":"Skoudis, E.: Counter Hack. Prentice-Hall, Englewood Cliffs (2002)"},{"key":"98_CR2","volume-title":"Practical Intrusion Detection Handbook","author":"P.E. Proctor","year":"2001","unstructured":"Proctor, P.E.: Practical Intrusion Detection Handbook. Prentice Hall PTR, Englewood Cliffs (2001)"},{"key":"98_CR3","doi-asserted-by":"crossref","unstructured":"Bykova, M., Ostermann, S., Tjaden, B.: Detection Network Intrusions via Statistical Analysis of Network Packet Characteristics. 33rd Southeastern Symposium on System Theory (SSST), 309\u2013314 (2001)","DOI":"10.1109\/SSST.2001.918537"},{"key":"98_CR4","unstructured":"Forozan, B.A.: TCP\/IP Protocol Suite. Mcgraw-Hill Companies, Inc (2000)"},{"key":"98_CR5","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/S0167-4048(01)00806-9","volume":"20","author":"E. Biermann","year":"2001","unstructured":"Biermann, E., Cloete, E., Venter, L.M.: A comparison of Intrusion Detection System. Computers and Security\u00a020, 676\u2013683 (2001)","journal-title":"Computers and Security"},{"key":"98_CR6","unstructured":"Northcut, S., Novak, J.: Network Intrusion Detection An Analyst\u2019s Handbook, 2nd edn., New Riders (2001)"},{"key":"98_CR7","unstructured":"http:\/\/www.cet.nau.edu\/~mc8\/Socket\/Tutorials\/section4.html"},{"key":"98_CR8","unstructured":"Kim, S.-C.: Abnormal IP Packets. Korea Computer Emergency Response Team Coordination Center (2001)"}],"container-title":["Lecture Notes in Computer Science","Agent Computing and Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11802372_98.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:36:27Z","timestamp":1736472987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11802372_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367079","9783540368601"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11802372_98","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}