{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T23:10:04Z","timestamp":1740525004506,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_13","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"146-157","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery"],"prefix":"10.1007","author":[{"given":"Hai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lunqun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"15","author":"P. Ammann","year":"2002","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from Malicious Transactions. IEEE Transactions on Knowledge and Data Engineering\u00a015, 1167\u20131185 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"doi-asserted-by":"crossref","unstructured":"Ammann, P., Jajodia, S., McCollum, C.D., Blaustein, B.T.: Surviving information warfare attacks on databases. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164\u2013174 (1997)","key":"13_CR2","DOI":"10.1109\/SECPRI.1997.601331"},{"doi-asserted-by":"crossref","unstructured":"Barbara, D., Goel, R., Jajodia, S.: Using checksums to detect data corruption. In: Proceedings of the 2000 International Conference on Extending Data Base Technology (2000)","key":"13_CR3","DOI":"10.1007\/3-540-46439-5_9"},{"doi-asserted-by":"crossref","unstructured":"Bishop, M., Cheung, S., et al.: The Threat from the Net. IEEE Spectrum\u00a038 (1997)","key":"13_CR4","DOI":"10.1109\/6.609475"},{"unstructured":"Graubart, R., Schlipper, L., McCollum, C.: Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation (1996)","key":"13_CR5"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/32.241771","volume":"19","author":"P. Helman","year":"1993","unstructured":"Helman, P., Liepins, G.: Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering\u00a019, 886\u2013901 (1993)","journal-title":"IEEE Transactions on Software Engineering"},{"unstructured":"Jagannathan, R., Lunt, T.: System design document: Next generation intrusion detection expert system (nides). Technical report, SRI International (1993)","key":"13_CR7"},{"doi-asserted-by":"crossref","unstructured":"Knight, J., Sullivan, K., et al.: Survivability architectures: Issues and approaches. In: Proceedings of the 2000 DARPA Information Survivability Conference & Exposition, pp. 157\u2013171 (2000)","key":"13_CR8","DOI":"10.21236\/ADA465737"},{"unstructured":"Luenam, P., Liu, P.: ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. Proc. 15th IFIP WG 11.3 Working Conference on Data and Application Security (2001)","key":"13_CR9"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"Lunt, T.F.: A Survey of Intrusion Detection Techniques. Computers & Security\u00a012, 405\u2013418 (1993)","journal-title":"Computers & Security"},{"unstructured":"Maheshwari, U., Vingralek, R., Shapiro, B.: How to Build a Trusted Database System on Untrusted Storage. In: Proc. USENIX Symposium on Operating Systems Design and Implementation, OSDI (2000)","key":"13_CR11"},{"doi-asserted-by":"crossref","unstructured":"McDermott, J., Goldschlag, D.: Towards a model of storage jamming. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 176\u2013185 (1996)","key":"13_CR12","DOI":"10.1109\/CSFW.1996.503703"},{"doi-asserted-by":"crossref","unstructured":"Medhi, D., Tipper, D.: Multi-layered network survivability- models, analysis, architecture, framework and implementation: An overview. In: Proceedings of the 2000 DARPA Information Survivability Conference & Exposition, pp. 173\u2013186 (2000)","key":"13_CR13","DOI":"10.1109\/DISCEX.2000.824977"},{"doi-asserted-by":"crossref","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network Intrusion Detection. IEEE Network, 26\u201341 (1994)","key":"13_CR14","DOI":"10.1109\/65.283931"},{"unstructured":"Liu, P.: Architectures for Intrusion Tolerant Database Systems. In: Proc. 2002 Annual Computer Security Applications Conference, pp. 311\u2013320 (2002)","key":"13_CR15"},{"unstructured":"Stavridou, V.: Intrusion tolerant software architectures. In: Proceedings of the 2001 DARPA Information Survivability Conference & Exposition (2000)","key":"13_CR16"},{"unstructured":"TPC-C benchmark, http:\/\/www.tpc.org\/tpcc\/","key":"13_CR17"},{"key":"13_CR18","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.863969","volume":"8","author":"J.J. Wylie","year":"2000","unstructured":"Wylie, J.J., Bigrigg, M.W., et al.: Survivable information storage systems. IEEE Computer\u00a08, 61\u201368 (2000)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:22Z","timestamp":1740523042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}