{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:04Z","timestamp":1725496204270},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76890-6_33","type":"book-chapter","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T05:37:06Z","timestamp":1195623426000},"page":"1062-1070","source":"Crossref","is-referenced-by-count":1,"title":["A Reliable Context-Aware Intrusion Tolerant System"],"prefix":"10.1007","author":[{"given":"Ayda","family":"Saidane","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks pages 2 (1999)","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"33_CR2","unstructured":"Jones, A.K., Sielken, R.S.: Computer System Intrusion Detection: A Survey. University of Virginia, Computer Science Technical Report pages 2 (2000)"},{"key":"33_CR3","unstructured":"Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. A CM MONET Journal pages 3 (2003)"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, B., Shi, Q., Merabti, M.: Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. In: Computer Software and Applications Conference, 2006. COMPSAC 2006. 30th Annual International pages 3 (2006)","DOI":"10.1109\/COMPSAC.2006.136"},{"key":"33_CR5","unstructured":"Zhong, S., Khoshgoftaar, T.M., Nath, S.: A Clustering Approach to Wireless Network Intrusion Detection. In: Proceedings of the 17th IEEE international Conference on Tools with Artificial intelligence pages 6 (2005)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76890-6_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:45:36Z","timestamp":1619505936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76890-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768890"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76890-6_33","relation":{},"subject":[]}}