{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:27:47Z","timestamp":1773772067302,"version":"3.50.1"},"reference-count":11,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2001,12,1]],"date-time":"2001-12-01T00:00:00Z","timestamp":1007164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,12]]},"DOI":"10.1016\/s0167-4048(01)00806-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T06:08:03Z","timestamp":1027577283000},"page":"676-683","source":"Crossref","is-referenced-by-count":106,"title":["A comparison of Intrusion Detection systems"],"prefix":"10.1016","volume":"20","author":[{"given":"E","family":"Biermann","sequence":"first","affiliation":[]},{"given":"E","family":"Cloete","sequence":"additional","affiliation":[]},{"given":"L.M","family":"Venter","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)00806-9_BIB1","doi-asserted-by":"crossref","unstructured":"Heady, R., Luger, G., Maccabe, A. & Servilla, M. 1990. The architecture of a network level network intrusion detection system. Technical report CS90-20, Department of Computer Science, University of New Mexico.","DOI":"10.2172\/425295"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB2","unstructured":"Russel, D. & Gangemi, G.T. 1992. Computer security basics. CA: O=Reilly & Associates Inc. 448p."},{"key":"10.1016\/S0167-4048(01)00806-9_BIB3","unstructured":"Caelli, W., Dennis, L. & Shain, M. 1994. Information Security Handbook. First edition. Wilthire: Macmillan Press Ltd. 833p."},{"key":"10.1016\/S0167-4048(01)00806-9_BIB4","unstructured":"Anderson, J.P. 1980. Computer Threat Monitoring and Surveillance. (In Anderson, J.P. Technical report, Fort Washington, Pennsylvania.)"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB5","doi-asserted-by":"crossref","unstructured":"Sundaram, A. 1996. An introduction to intrusion detection. Crossroads: The ACM student magazine, 2(4), April.","DOI":"10.1145\/332159.332161"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB6","doi-asserted-by":"crossref","unstructured":"Denning, D.E. 1987. An Intrusion-Detection Model. IEEE Transactions on software Engineering, 13(2):222\u2013232, Feb.","DOI":"10.1109\/TSE.1987.232894"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB7","doi-asserted-by":"crossref","unstructured":"Parker, D.B. 1994. Demonstrating the elements of information security with threats. (In Proceedings of the 17th National Computer Security Conference, pages 421\u2013430.)","DOI":"10.1080\/10658989409342440"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB8","unstructured":"Lane, T. & Brodley, C.E. 1997. An application of machine learning to anomaly detection. (In 20th National Information System Security Conference.)"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB9","unstructured":"Frank, J. 1994. Artificial intelligence and intrusion detection: current and future directions. (In Proceedings of the 17th National Computer Security Conference, October 1994.)"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB10","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyer, S.A, Somayaji, A. & Longstaff, T.A. 1996. A sense of self for Unix process. (In Proceedings of the 1996 IEEE Symposium on Security& Privacy at Los Alamitos. CA. p. 120\u2013128.)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"10.1016\/S0167-4048(01)00806-9_BIB11","unstructured":"Lee, W., Stolfe, S.J. & Chan, P.K. Learning patterns from UNIX process execution traces for intrusion detection. (In AAAI Workshop: AI approaches to fraud detection and risk management, AAAI press, July 1997, p.50\u201356.)"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801008069?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801008069?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T20:45:51Z","timestamp":1578429951000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801008069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2001,12]]}},"alternative-id":["S0167404801008069"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)00806-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,12]]}}}