{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:51Z","timestamp":1773150231633,"version":"3.50.1"},"reference-count":11,"publisher":"Elsevier BV","issue":"23-24","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1016\/s1389-1286(99)00113-9","type":"journal-article","created":{"date-parts":[[2003,3,25]],"date-time":"2003-03-25T22:25:53Z","timestamp":1048631153000},"page":"2477-2487","source":"Crossref","is-referenced-by-count":39,"title":["Intrusion detection systems as evidence"],"prefix":"10.1016","volume":"31","author":[{"given":"Peter","family":"Sommer","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(99)00113-9_BIB1","unstructured":"President\u2019s National Security Telecommunications Advisory Committee (NTSAC) Network Group Intrusion Detection Subgroup, available on http:\/\/www.ntsac.org as FIDSGREP.PDF"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB2","unstructured":"P. Sommer, Digital footprints: assessing computer evidence, Criminal Law Review Special Edition: Crime, Criminal Justice and the Internet, 1998, pp. 61\u201378"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB3","unstructured":"ss 23\u201324 Criminal Justice Act, 1988, s 8 Civil Evidence Act 1995"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB4","unstructured":"s 78 Police and Criminal Evidence Act, 1984"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB5","unstructured":"Harvey, The advocate\u2019s devil, 1985"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB6","unstructured":"Court of Appeal, July 31, 1996"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB7","unstructured":"Frye v US 293 F.1013 (D.C. Cir. 1923)"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB8","unstructured":"Daubert v. Merrell Dow Pharmaceuticals Inc. 113 S.Ct. 2786, 1993"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB9","unstructured":"L.P. Brad, Beyond the rule in Mohan: a new model for assessing the reliability of scientific evidence, Toronto Law Review 54 (1)"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB10","doi-asserted-by":"crossref","unstructured":"P. Sommer, Evidence from cyberspace: downloads, logs and captures, Journal of Financial Crime 5JFC2, 138\u2013152","DOI":"10.1108\/eb025826"},{"key":"10.1016\/S1389-1286(99)00113-9_BIB11","unstructured":"B. Schneier, J. Kelsey, Cryptographic support for secure logs on untrusted machines, The Seventh USENIX Security Symposium Proceedings, USENIX Press, January 1998, pp. 53\u201362"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128699001139?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128699001139?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T01:04:26Z","timestamp":1579050266000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128699001139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":11,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[1999,12]]}},"alternative-id":["S1389128699001139"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(99)00113-9","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}