{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:05:03Z","timestamp":1761807903543,"version":"3.40.4"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119328"},{"type":"electronic","value":"9783319119335"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11933-5_44","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T04:19:15Z","timestamp":1413519555000},"page":"405-411","source":"Crossref","is-referenced-by-count":46,"title":["Real Time Intrusion Detection and Prevention System"],"prefix":"10.1007","author":[{"given":"Poonam Sinai","family":"Kenkre","sequence":"first","affiliation":[]},{"given":"Anusha","family":"Pai","sequence":"additional","affiliation":[]},{"given":"Louella","family":"Colaco","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, L.C., Mora, M., Alvarez, F.J.: A Descriptive Comparative Study of the Evolution of Process Models of Software Development Life Cycles (PM-SDLCs). In: Proc. of Mexican International Conference on Computer Science 2009, pp. 298\u2013303 (2009)","DOI":"10.1109\/ENC.2009.45"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Unphon, H.: Making use of architecture throughout the software life cycle - How the build hierarchy can facilitate product line development. In: Proc. of ICSE Workshop on Sharing and Reusing Architectural Knowledge 2009, pp. 41\u201348 (2009)","DOI":"10.1109\/SHARK.2009.5069114"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Wild, C., Maly, K., Zhang, C., Roberts, C.C., Rosca, D., Taylor, T.: Software engineering life cycle support-decision based systems development. In: Proceedings of IEEE Region Ninth Annual International Conference TENCON 1994, vol.\u00a02, pp. 781\u2013784 (1994)","DOI":"10.1109\/TENCON.1994.369205"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Zhongwen, C., Tiecheng, Z., Xiaohui, G.: The study on network intrusion detection system of Snort. In: 2nd International Conference on Networking and Digital Society (ICNDS), vol.\u00a02, pp. 194\u2013196 (2010)","DOI":"10.1109\/ICNDS.2010.5479341"},{"issue":"11","key":"44_CR5","first-page":"33","volume":"9","author":"E.C. Ezin","year":"2011","unstructured":"Ezin, E.C., Djihountry, H.A.: Java-Based Intrusion Detection System in a Wired Network (IJCSIS) International Journal of Computer Science and Information Security\u00a09(11), 33\u201340 (2011)","journal-title":"(IJCSIS) International Journal of Computer Science and Information Security"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Tan, L., Sherwood, T.: A High Throughput String Matching Architecture for Intrusion Detection and Prevention. In: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pp. 112\u2013122 (2005)","DOI":"10.1145\/1080695.1069981"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Pal, R., Hossain, M., Bikas, A.N., Hasan, K.: NIDS:A network based approach to intrusion detection and prevention. In: 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC, pp. 141\u2013144 (2009)","DOI":"10.1109\/IACSIT-SC.2009.96"},{"key":"44_CR8","unstructured":"Kumar, A., Fernandez, E.B.: Security Patterns for Intrusion Detection Systems. In: 1st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), Panama City, Panama, July 23-27 (2012)"},{"key":"44_CR9","unstructured":"Singh, S., Bansal, M.: Improvement of Intrusion Detection System in Data Mining using Neural Network. International Journal of Advanced Research in Computer Science and Software Engineering\u00a03(9) (September 2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11933-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T05:39:05Z","timestamp":1746423545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11933-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319119328","9783319119335"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11933-5_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}