{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:21Z","timestamp":1763468001493},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231233"},{"type":"electronic","value":"9783540301431"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30143-1_16","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T23:59:24Z","timestamp":1284854364000},"page":"296-314","source":"Crossref","is-referenced-by-count":31,"title":["RheoStat: Real-Time Risk Management"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Gehani","sequence":"first","affiliation":[]},{"given":"Gershon","family":"Kedem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Bauer, D.S., Koblentz, M.E.: NIDX - A Real-Time Intrusion Detection Expert System. In: Proc. of USENIX Technical Conference, pp. 261\u2013273 (1988)","DOI":"10.1109\/CNS.1988.4983"},{"key":"16_CR2","unstructured":"Bilar, D.: Quantitative Risk Analysis of Computer Networks, PhD thesis, Dartmouth College (2003)"},{"key":"16_CR3","unstructured":"http:\/\/documents.iss.net\/literature\/BlackICE\/BISP-UG_36.pdf"},{"key":"16_CR4","unstructured":"Carver, C.: Adaptive, Agent-based Intrusion Response, PhD thesis, Texas A and M University (2001)"},{"key":"16_CR5","unstructured":"http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/products\/ps2113\/c1626\/ccmigration_09186a00800ee98e.pdf"},{"key":"16_CR6","unstructured":"Guidelines for Automatic Data Processing Physical Security and Risk Management, National Bureau of Standards (1974)"},{"key":"16_CR7","unstructured":"Fisch, E.: Intrusive Damage Control and Assessment Techniques, PhD thesis, Texas A and M University (1996)"},{"key":"16_CR8","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, San Francisco (1979)"},{"key":"16_CR9","unstructured":"Gehani, A.: Support for Automated Passive Host-based Intrusion Response, PhD thesis, Duke University (2003)"},{"key":"16_CR10","unstructured":"http:\/\/icat.nist.gov\/icat.cfm"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Transactions on Software Engineering\u00a021(3), 181\u2013199 (1995)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"16_CR12","unstructured":"http:\/\/enterprisesecurity.symantec.com\/content\/ProductJump.cfm?Product=171"},{"key":"16_CR13","unstructured":"http:\/\/documents.iss.net\/literature\/RealSecure\/RSDP-UG_70.pdf"},{"key":"16_CR14","unstructured":"http:\/\/www.w3.org\/Jigsaw"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BFb0053969","volume-title":"Approximation Algorithms for Combinatorial Optimization","author":"H. Kellerer","year":"1998","unstructured":"Kellerer, H., Pferschy, U.: A new fully polynomial approximation scheme for the knapsack problem. In: Jansen, K., Rolim, J.D.P. (eds.) APPROX 1998. LNCS, vol.\u00a01444, pp. 123\u2013134. Springer, Heidelberg (1998)"},{"issue":"3","key":"16_CR16","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1147\/sj.373.0349","volume":"37","author":"L. Koved","year":"1998","unstructured":"Koved, L., Nadalin, A.J., Neal, D., Lawson, T.: The Evolution of Java Security. IBM Systems Journal\u00a037(3), 349\u2013364 (1998)","journal-title":"IBM Systems Journal"},{"key":"16_CR17","unstructured":"http:\/\/symantec.com"},{"key":"16_CR18","unstructured":"Guidelines for Automatic Data Processing Physical Security and Risk Management, National Institute of Standards and Technology (1996)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Pooch, U., White, G.B.: Cooperating Security Managers: Distributed Intrusion Detection System. Computer and Security\u00a05(15), 441\u2013450 (1996)","DOI":"10.1016\/0167-4048(96)00012-0"},{"key":"16_CR20","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the Nineteenth National Computer Security Conference, Baltimore, MD, October 1997, pp. 353\u2013365 (1997)"},{"key":"16_CR21","unstructured":"Hoo, K.S.: Guidelines for Automatic Data Processing Physical Security and Risk Management, PhD Thesis, Stanford University (2002)"},{"key":"16_CR22","unstructured":"http:\/\/www.specbench.org\/osg\/jvm98\/"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30143-1_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:44:52Z","timestamp":1605761092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30143-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231233","9783540301431"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30143-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}