{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:10:28Z","timestamp":1725487828897},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540140405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39205-x_126","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T18:23:13Z","timestamp":1185042193000},"page":"730-733","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Intrusion Detection Strategy Used for Web Security"],"prefix":"10.1007","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Han","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaojun","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Denning D E. An intrusion-detection model, IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, USA, (1987) 118\u2013131","key":"126_CR1","DOI":"10.1109\/TSE.1987.232894"},{"key":"126_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/ACSAC.1988.113412","volume-title":"Proc. of the IEEE Fourth Aerospace Computer Security Application Conference","author":"S. E. Smaha","year":"1988","unstructured":"Smaha S E, Haystack:An intrusion detection system, Proc. of the IEEE Fourth Aerospace Computer Security Application Conference. Orlando, FL: IEEE, (1988)37\u201344"},{"doi-asserted-by":"crossref","unstructured":"Christina Warrender, Stephanie Forrest, and Barak Pearlmutter. Detecting intrusions using system calls: alternative data models, Proc.of the 1999 IEEE Symposium on Security and Privacy, IEEE, (1999)1033\u2013145","key":"126_CR3","DOI":"10.1109\/SECPRI.1999.766910"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39205-X_126.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:55Z","timestamp":1619572855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39205-X_126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540140405"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-39205-x_126","relation":{},"subject":[]}}