{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:00:41Z","timestamp":1761397241973,"version":"build-2065373602"},"reference-count":22,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100003176","name":"Ministerio de Educaci\u00f3n, Cultura y Deporte","doi-asserted-by":"publisher","award":["AP2001-3805"],"award-info":[{"award-number":["AP2001-3805"]}],"id":[{"id":"10.13039\/501100003176","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,12]]},"DOI":"10.1016\/s1389-1286(03)00291-3","type":"journal-article","created":{"date-parts":[[2003,5,27]],"date-time":"2003-05-27T18:47:42Z","timestamp":1054061262000},"page":"573-600","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["NSDF: a computer network system description framework and its application to network security"],"prefix":"10.1016","volume":"43","author":[{"given":"Juan M.","family":"Est\u00e9vez-Tapiador","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Garc\u0131\u0301a-Teodoro","sequence":"additional","affiliation":[]},{"given":"Jes\u00fas E.","family":"D\u0131\u0301az-Verdejo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"1994","series-title":"Fundamentals of Computer Security Technology","author":"Amoroso","key":"10.1016\/S1389-1286(03)00291-3_BIB1"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB2","unstructured":"E.G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back and Response, Second Printing, Intrusion.Net Books, NJ, USA, June 1999, pp. 100\u2013105 (Chapter 4)"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB3","unstructured":"T. Aslam, A taxonomy of security faults in the unix operating system, Master\u2019s Thesis, Purdue University, West Lafayette, Indiana, USA, August, 1995"},{"year":"1990","series-title":"Software Testing Techniques","author":"Beizer","key":"10.1016\/S1389-1286(03)00291-3_BIB4"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB5","series-title":"Proceedings of the 2000 IEEE Workshop on Information Assurance and Security","article-title":"An intrusion response taxonomy and its role in automatic intrusion response","author":"Carver","year":"2000"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB6","unstructured":"CERT\u00ae Coordination Center, CERT\/CC Statistics for 1988 through 2002. Available from <http:\/\/www.cert.org\/stats>"},{"year":"1995","series-title":"Protection and Security on the Information Superhighway","author":"Cohen","key":"10.1016\/S1389-1286(03)00291-3_BIB7"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB8","unstructured":"E.A. Fisch, Intrusion damage control and assessment: a taxonomy and implementation of automated responses to intrusive behaviour, Ph.D. Dissertation, Texas A&M University, College Station, TX, USA, 1996"},{"issue":"3","key":"10.1016\/S1389-1286(03)00291-3_BIB9","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/47671.47672","article-title":"Protection imperfect: The security of some computing environments","volume":"22","author":"Hogan","year":"1988","journal-title":"Operating Systems Review"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB10","unstructured":"J.D. Howard, An analysis of security incidents on the Internet, 1989\u20131995, Ph.D. Dissertation, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, PA, USA, April, 1997"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB11","unstructured":"J. Radatz (Ed.), IEEE, The IEEE Standard Dictionary of Electrical and Electronics Terms, sixth ed., Institute of Electrical and Electronics Engineers, Inc., NY, USA, 1996"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB12","doi-asserted-by":"crossref","unstructured":"C. Kiddle, R. simmonds, D.K. Wilson, B. Unger, ANML: a language for describing networks, in: Proceedings of the Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Cincinnati, OH, USA, 15\u201318 August 2001, pp. 135\u2013141","DOI":"10.1109\/MASCOT.2001.948862"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB13","unstructured":"S. Kumar, Classification and detection of computer intrusions, Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN, USA, August, 1995"},{"issue":"3","key":"10.1016\/S1389-1286(03)00291-3_BIB14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/185403.185412","article-title":"A taxonomy of computer program security flaws","volume":"26","author":"Landwehr","year":"1994","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB15","series-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","first-page":"154","article-title":"How to systematically classify computer security intrusions","author":"Lindqvist","year":"1997"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network intrusion detection","author":"Mukherjee","year":"1994","journal-title":"IEEE Networks"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB17","unstructured":"P.G. Neumann, D.B. Parker, A summary of computer misuse techniques, in: Proceedings of the 12th National Computer Security Conference, Baltimore, MD, USA, 10\u201313 October 1989, pp. 396\u2013407"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB18","unstructured":"A. Ogielski, Domain Modeling Language (DML) Reference Manual, 1999. Available from <http:\/\/www.ssfnet.org\/SSFdocs\/dmlReference.html>"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB19","unstructured":"T. Olovsson, Practical experimentation as a tool for vulnerability analysis and security evaluation, Ph.D. thesis, School of Electrical and Computer Engineering, Chalmers University of Technology, G\u00f6teborg, Sweden, 1995"},{"key":"10.1016\/S1389-1286(03)00291-3_BIB20","unstructured":"T.H. Ptacek, T.N. Newsham, Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection, 1998. Available from <http:\/\/www.securityfocus.com\/data\/library\/ids.ps>"},{"year":"1991","series-title":"Computer Security Basis","author":"Russell","key":"10.1016\/S1389-1286(03)00291-3_BIB21"},{"issue":"2","key":"10.1016\/S1389-1286(03)00291-3_BIB22","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1145\/42186.42323","article-title":"A relational approach to monitoring complex systems","volume":"6","author":"Snodgrass","year":"1988","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002913?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002913?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:57:11Z","timestamp":1761397031000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128603002913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,12]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2003,12]]}},"alternative-id":["S1389128603002913"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(03)00291-3","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2003,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"NSDF: a computer network system description framework and its application to network security","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1389-1286(03)00291-3","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2003 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}