{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:25:50Z","timestamp":1775024750048,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642041167","type":"print"},{"value":"9783642041174","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_9","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"177-192","source":"Crossref","is-referenced-by-count":18,"title":["Intrusion Detection and Prevention Systems"],"prefix":"10.1007","author":[{"given":"Karen","family":"Scarfone","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Mell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"Intrusion Detection","author":"R. Bace","year":"2000","unstructured":"R.\u00a0Bace: Intrusion Detection (New Riders, Indianapolis 2000)"},{"key":"9_CR2","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"2002","unstructured":"S.\u00a0Northcutt, J.\u00a0Novak: Network Intrusion Detection, 3rd edn. (New Riders, Boston 2002)","edition":"3"},{"key":"9_CR3","volume-title":"Intrusion Prevention and Active Response: Deploying Network and Host IPS","author":"M. Rash","year":"2005","unstructured":"M.\u00a0Rash, A.\u00a0Orebaugh, G.\u00a0Clark, B.\u00a0Pinkard, J.\u00a0Babbin: Intrusion Prevention and Active Response: Deploying Network and Host IPS (Syngress, Rockland, Massachusetts 2005)"},{"key":"9_CR4","unstructured":"K. Kent Frederick: Network Intrusion Detection Signatures, Part Three, SecurityFocus (2002)"},{"key":"9_CR5","unstructured":"K. Kent Frederick: Network Intrusion Detection Signatures, Part Five, SecurityFocus (2002)"},{"key":"9_CR6","volume-title":"Special Publication 800-94: Guide to Intrusion Detection and Prevention Systems (IDPS)","author":"K. Scarfone","year":"2007","unstructured":"K.\u00a0Scarfone, P.\u00a0Mell: Special Publication 800-94: Guide to Intrusion Detection and Prevention Systems (IDPS) (National Institute of Standards and Technology, Gaithersburg 2007)"},{"key":"9_CR7","volume-title":"Inside Network Perimeter Security","author":"S. Northcutt","year":"2005","unstructured":"S.\u00a0Northcutt, L.\u00a0Zeltser, S.\u00a0Winters, K.\u00a0Kent, R.\u00a0Ritchey: Inside Network Perimeter Security, 2nd edn. (Sams Publishing, Indianapolis 2005)","edition":"2"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"IEEE Computer Society: IEEE Standard 802.11-2007 (2007)","DOI":"10.1109\/MC.2007.207"},{"key":"9_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3458-4","volume-title":"Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint","author":"D. Marchette","year":"2001","unstructured":"D.\u00a0Marchette: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint (Springer, New York 2001)"},{"key":"9_CR10","volume-title":"Special Publication 800-92: Guide to Computer Security Log Management","author":"K. Kent","year":"2006","unstructured":"K.\u00a0Kent, M.\u00a0Souppaya: Special Publication 800-92: Guide to Computer Security Log Management (National Institute of Standards and Technology, Gaithersburg 2006)"},{"key":"9_CR11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-83","volume-title":"Special Publication 800-83: Guide to Malware Incident Prevention and Handling","author":"P. Mell","year":"2005","unstructured":"P.\u00a0Mell, K.\u00a0Kent, J.\u00a0Nusbaum: Special Publication 800-83: Guide to Malware Incident Prevention and Handling (National Institute of Standards and Technology, Gaithersburg 2005)"},{"key":"9_CR12","unstructured":"L. Spitzner: The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues, SecurityFocus (2001)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T12:08:43Z","timestamp":1685448523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_9","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}