{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:13:37Z","timestamp":1740806017623,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_32","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:57:18Z","timestamp":1290603438000},"page":"276-281","source":"Crossref","is-referenced-by-count":0,"title":["Insecure Information System\u2019s Solution Using Isolation Method"],"prefix":"10.1007","author":[{"given":"Maricel","family":"Balitanas","sequence":"first","affiliation":[]},{"given":"Tai-hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Graubart, R., Schlipper, L., McCollum, C.: Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation (1996)"},{"key":"32_CR2","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. Technical report, George Mason University, Fairfax, VA, http:\/\/www.isse.gmu.edu\/~pliu\/papers\/dynamic.ps"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Liu, P., McCollum, C.: Applicationlevel isolation to cope with malicious database users. In: Proceedings of the 14th Annual Computer Security Application Conference, Phoenix, AZ, pp. 73\u201382 (1998)","DOI":"10.1109\/CSAC.1998.738580"},{"key":"32_CR4","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"1999","unstructured":"Northcutt, S.: Network Intrusion Detection. New Riders, Indianapolis (1999)"},{"issue":"3","key":"32_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R., Porras, P.: State transition analysis: A rulebased intrusion detection approach. IEEE Transactions on Software Engineering\u00a021(3), 181\u2013199 (1995)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:16:00Z","timestamp":1740719760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}