{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:08:44Z","timestamp":1743109724606,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475759501"},{"type":"electronic","value":"9780387357034"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-0-387-35703-4_20","type":"book-chapter","created":{"date-parts":[[2013,6,4]],"date-time":"2013-06-04T16:56:22Z","timestamp":1370364982000},"page":"263-273","source":"Crossref","is-referenced-by-count":1,"title":["Management of Security in TCP\/IP Hosts Using Dedicated Monitoring Applications"],"prefix":"10.1007","author":[{"given":"Rui Costa","family":"Cardoso","sequence":"first","affiliation":[]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"5","volume-title":"Computer Attack Trends Challenge Internet Security","author":"A Householder","year":"2002","unstructured":"A. Householder, K. Houle, and C. Dougherty, \u201cComputer Attack Trends Challenge Internet Security\u201d, IEEE Computer, Security and Privacy\u2013Supplement, April 2002, pp. 5\u20137."},{"key":"20_CR2","unstructured":"URL: http:\/\/www.cert.org"},{"key":"20_CR3","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"JP Anderson","year":"1980","unstructured":"J. P. Anderson, \u201cComputer Security Threat Monitoring and Surveillance\u201d, James P. Anderson, Co. Fort Washington, PA, 1980."},{"key":"20_CR4","first-page":"27","volume-title":"Intrusion Detection: A Brief History and Over-view","author":"RA Kemmerer","year":"2002","unstructured":"R. A. Kemmerer and G. Vigna, \u201cIntrusion Detection: A Brief History and Over-view\u201d, IEEE Computer, Security and Privacy\u2013Supplement, April 2002, pp. 27\u201329."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"C. Manikopoulos and S. Papavassiliou, \u201cNetwork Intrusion and Fault Detection: A Statistical Anomaly Approach\u201d, IEEE Communications Magazine, Vol. 40, No. 10, pp. 76\u201382.","DOI":"10.1109\/MCOM.2002.1039860"},{"key":"20_CR6","first-page":"389","volume-title":"Heidelberg","author":"B Kim","year":"2344","unstructured":"B. Kim, J.Jang, and T. M. Chung, \u201cDesign of Network Security Control Systems for Cooperative Intrusion Detection\u201d, in Information Networking, I. Chong (Ed.), Heidelberg, Springer Verlag, LNCS 2344, 2002, pp. 389\u2013398."},{"key":"20_CR7","volume-title":"Ieee Transactions on Software Engineering","author":"DE Denning","year":"1987","unstructured":"D. E. Denning, \u201cAn Intrusion-Detection Model\u201d, IEEE Transactions on Software Engineering, February 1987."},{"key":"20_CR8","first-page":"289","volume":"1820","author":"G Quo","year":"2002","unstructured":"G. Quo, J. Rudraraju, R. Modukuri, S. Hariri, \u201cA Framework for Network Vulnerability Analysis\u201d, Proceedings of IASTED International Conference Communication, Internet & Information Technology, November 18\u201320, 2002, pp. 289\u2013294.","journal-title":"Proceedings of Iasted International Conference Communication, Internet & Information Technology, November"},{"key":"20_CR9","first-page":"913","volume":"1214","author":"M Yi","year":"2003","unstructured":"M. Yi, C. Hwang, \u201cDesign of fault tolerante Architecture for Intrusion Detection systems Using Autonomous Agents\u201d, Proceedings of The International Conference on Information Networking (ICOIN\u20192003), February 12\u201314, 2003, pp. 913\u2013922.","journal-title":"Proceedings of The International Conference on Information Networking (ICOIN2003), February"},{"key":"20_CR10","unstructured":"URL: http:\/\/www.nessus.org."},{"key":"20_CR11","unstructured":"URL: http:\/\/www.saintcorporation.com"},{"key":"20_CR12","unstructured":"URL: http:\/\/icat.nist.gov"},{"key":"20_CR13","unstructured":"URL: http:\/\/www.ripe.net\/perl\/whois"},{"key":"20_CR14","unstructured":"URL:http:\/\/www.agentcites.org"},{"key":"20_CR15","volume-title":"In 22nd National Information System Security Conference","author":"P Mell","year":"1999","unstructured":"P. Mell, \u201cUnderstanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit)\u201d, in 22nd National Information System Security Conference, October 1999."},{"key":"20_CR16","unstructured":"URL: http:\/\/www.portsdb.org"},{"key":"20_CR17","unstructured":"URL: http:\/\/www.iana.org"},{"key":"20_CR18","unstructured":"URL: http:\/\/www.cve.mitre.org."},{"key":"20_CR19","unstructured":"URL: http:\/\/www.fipa.org"},{"key":"20_CR20","unstructured":"URL: http:\/\/www.nist.gov."}],"container-title":["IFIP Advances in Information and Communication Technology","Network Control and Engineering for QoS, Security and Mobility II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35703-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T10:38:38Z","timestamp":1557743918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35703-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9781475759501","9780387357034"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35703-4_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2003]]}}}