{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:59Z","timestamp":1725520679061},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_39","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"301-308","source":"Crossref","is-referenced-by-count":0,"title":["nokLINK: A New Solution for Enterprise Security"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Pedersoli","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Cristiano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Gleeson, B., Lin, A., Heinane, J., Armitage, G., Malis, A.: A Framework for IP based Virtual Private Networks. Internet Engineering Task Force, RFC 2764 (2000)","key":"39_CR1","DOI":"10.17487\/rfc2764"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1007\/978-3-540-77226-2_72","volume-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2007","author":"\u00c1. Herrero","year":"2007","unstructured":"Herrero, \u00c1., Corchado, E., Gastaldo, P., Leoncini, D., Picasso, F., Zunino, R.: Intrusion Detection at Packet Level by Unsupervised Architectures. In: Yin, H., Tino, P., Corchado, E., Byrne, W., Yao, X. (eds.) IDEAL 2007. LNCS, vol.\u00a04881, pp. 718\u2013727. Springer, Heidelberg (2007)"},{"key":"39_CR3","volume-title":"Network Security: Private Communication in a Public World","author":"C. Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall, Englewood Cliffs (2002)","edition":"2"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:10Z","timestamp":1619524630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_39","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}