{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:26:09Z","timestamp":1714940769290},"reference-count":1,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046778","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T11:20:59Z","timestamp":1469704859000},"page":"1693-1700","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection Systems (IDSs)"],"prefix":"10.1081","author":[{"given":"Ken M.","family":"Shaurette","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"CIT0001","volume-title":"The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage","author":"Stoll C.","year":"1990"}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T06:23:25Z","timestamp":1473488605000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":1,"alternative-id":["10.1081\/E-EIA-120046778","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046778","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}