{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:43:29Z","timestamp":1725601409689},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642233562"},{"type":"electronic","value":"9783642233579"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23357-9_57","type":"book-chapter","created":{"date-parts":[[2011,8,20]],"date-time":"2011-08-20T08:08:43Z","timestamp":1313827723000},"page":"314-319","source":"Crossref","is-referenced-by-count":0,"title":["Research on Audit System Based on PHP with Analysis of Scientific Materials"],"prefix":"10.1007","author":[{"given":"Qingxiu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Min","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","unstructured":"Yu, H., Weimin, X.: Scalable Web log collection design and implementation of the framework. Computer applications and software\u00a0(01) (2008)"},{"key":"57_CR2","unstructured":"Yong, W., Yifeng, L.: Based on log audit network security situation assessment model and performance correction algorithm. Computer Journal\u00a0(04) (2009)"},{"key":"57_CR3","unstructured":"Lei, W., Binxing, F.: An implementation method based on network log audit tracking system. Computer engineering and application\u00a0(01) (2006)"},{"key":"57_CR4","unstructured":"Huaping, Z., Haowei, L.: Linux based firewall log audit system study and realization. Automation technologies and applications\u00a0(11) (2005)"},{"key":"57_CR5","unstructured":"Deng, X., Chen, L., Wang, G.: Security audit data analysis method of comprehensive audit. Journal of Chongqing University of posts and telecommunications (natural science Edition)\u00a0(5) (2005)"},{"key":"57_CR6","unstructured":"Li, C., Zhou, G.: Attention to log auditing ensure data security. Medical information\u00a0(10) (2007)"}],"container-title":["Communications in Computer and Information Science","Advances in Computer Science, Environment, Ecoinformatics, and Education"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23357-9_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T15:09:33Z","timestamp":1554044973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23357-9_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642233562","9783642233579"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23357-9_57","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}