{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T02:05:30Z","timestamp":1776996330297,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540220602","type":"print"},{"value":"9783540247685","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_61","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T21:14:08Z","timestamp":1284153248000},"page":"574-583","source":"Crossref","is-referenced-by-count":8,"title":["Software Rejuvenation Approach to Security Engineering"],"prefix":"10.1007","author":[{"given":"Khin Mi Mi","family":"Aung","sequence":"first","affiliation":[]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","volume-title":"Security Engineering:A guide to building dependable distributed systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering:A guide to building dependable distributed systems. John Wiley and Sons, USA (2001) ISBN 0-471-38922-6"},{"key":"61_CR2","unstructured":"Aung, K.M.M.: The optimum time to perform software rejuvenation for survivability. In: Proc. of IASTED Int. Conf., SE 2004, Innsbruck, Austria, pp. 292\u2013296 (2004)"},{"key":"61_CR3","unstructured":"Cannady, J.: Artificial neural networks for misuse detection. In: Proc. of NISSC, Arlington, VA, pp. 443\u2013456 (1998)"},{"key":"61_CR4","first-page":"61","volume-title":"Network survivability performance evaluation: a quantitative approach with applications in wireless ad-hoc networks","author":"D. Chen","year":"2002","unstructured":"Chen, D., Garg, S., Trivedi, K.S.: Network survivability performance evaluation: a quantitative approach with applications in wireless ad-hoc networks, pp. 61\u201368. ACM Press, Georgia (2002)"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Clevelnd, W.S., Sun, D.X.: Internet Traffic Data. Journal of the American Statistical Association, 979\u2013985 (2000)","DOI":"10.1080\/01621459.2000.10474289"},{"key":"61_CR6","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons, USA (2000) ISBN 0-471-05669-3"},{"key":"61_CR7","unstructured":"Ericsson, X.Z., Wu, S.F., Fu, Z., Wu, T.L.: Malicious Packet Dropping: How it Might Impact the TCP Performance and How We Can Detect It. In: Proc. of IEEE ICNP, pp. 263\u2013272 (2000)"},{"key":"61_CR8","unstructured":"Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: Proc. of the 13th NCSC, Baltimore, MD (1994)"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D.: A Network Security Monitor. In: Proc. of IEEE SRCSP, pp. 296\u2013304 (1990)","DOI":"10.1109\/RISP.1990.63859"},{"key":"61_CR10","unstructured":"Herman, P.: The tcpstat tool (2003), \n                    \n                      http:\/\/www.frenchfries.net\/paul\/tcpstat"},{"key":"61_CR11","doi-asserted-by":"crossref","unstructured":"Huang, Y., Kintala, C.M.R., Kolettis, N., Fulton, N.D.: Software Rejuvenation: Analysis, Module and Applications. In: Proc. of FTCS-25, Pasadena, CA, pp. 381\u2013390 (1995)","DOI":"10.1109\/FTCS.1995.466961"},{"key":"61_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principal Component Analysis","author":"I.T. Joliffe","year":"1986","unstructured":"Joliffe, I.T.: Principal Component Analysis. Springer, New York (1986)"},{"key":"61_CR13","unstructured":"Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 130\u2013143 (2001)"},{"issue":"1","key":"61_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural networks, principal components, and subspaces. International Journal of Neural Systems\u00a01(1), 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"},{"issue":"3","key":"61_CR15","first-page":"675","volume":"35","author":"J.R. Rohlicek","year":"1988","unstructured":"Rohlicek, J.R., Willsky, A.S.: The reduction of perturbed Markov generators: an algorithm exposing the role of transient states. ACM Press\u00a035(3), 675\u2013696 (1988)","journal-title":"ACM Press"},{"key":"61_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/3-540-44819-5_14","volume-title":"Multimedia Databases and Image Communication","author":"Q. Tian","year":"2001","unstructured":"Tian, Q., Moghaddam, B., Huang, T.S.: Display Optimization for Image Browsing. In: Tucci, M. (ed.) MDIC 2001. LNCS, vol.\u00a02184, pp. 167\u2013173. Springer, Heidelberg (2001) ISBN: 3-540-42587-X"},{"key":"61_CR17","volume-title":"TCP\/IP Illustrated","author":"G.R. Wright","year":"1996","unstructured":"Wright, G.R., Stevens, R.W.: TCP\/IP Illustrated. Addison Wesley, Reading (1996) ISBN 0-201-63354-X"},{"key":"61_CR18","unstructured":"Wu, T.L.: Securing Internet QoS: Threats and Countermeasures. Ph.D. Thesis, North Carolina State University (1999)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_61.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:08:48Z","timestamp":1619996928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}