{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:20Z","timestamp":1754157680590,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2004,2]]},"DOI":"10.1108\/09685220410518810","type":"journal-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T18:12:30Z","timestamp":1078251150000},"page":"27-44","source":"Crossref","is-referenced-by-count":5,"title":["A new two\u2010tiered strategy to intrusion detection"],"prefix":"10.1108","volume":"12","author":[{"given":"A.S.","family":"Sodiya","sequence":"first","affiliation":[]},{"given":"H.O.D.","family":"Longe","sequence":"additional","affiliation":[]},{"given":"A.T.","family":"Akinwale","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b1","unstructured":"Anderson, D., Frivold, T., Tamaru, A. and Valdes, A. (1994), NIDES: Software Users Manual: Beta\u2010Update Release, SRI International, December, available at: www.sdl.sri.com\/papers\/7sri\/."},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"b5","unstructured":"Debar, H., Dacier, M., Wespi, A. and Lampart, S. (1998), An Experimentation Workbench for Intrusion Detection Systems, Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, March."},{"key":"b6","unstructured":"Denning, D.E. and Neumann, P.G. (1985), Requirements and Model for IDES \u2013 a Real\u2010time Intrusion Detection Expert System, Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA."},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306571"},{"key":"b8","unstructured":"Fawcett, T. and Provost, F. (1996), \u201cCombining data mining and machine learning for effective user profiling\u201d, Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD\u201096), pp. 8\u201013."},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287646"},{"key":"b13","unstructured":"Kumar, S. and Spafford, E.H. (1994), \u201cA pattern matching model for misuse intrusion detection\u201d, Proceedings of the 17th National Computer Security Conference, pp. 11\u201021."},{"key":"b25","unstructured":"Paxon, V. (1998), \u201cBro: a system for detecting network intruders in realtime\u201d, Proceedings of the 7th USENIX Security Symposium, pp. 31\u201051."},{"key":"b26","doi-asserted-by":"publisher","DOI":"10.1109\/32.544350"},{"key":"b28","unstructured":"Snapp, S.R., Smaha, S.E., Teal, D.M. and Grance, T. (1992), \u201cThe DIDS (distributed intrusion detection system) prototype\u201d, Proceedings of the Summer USENIX Conference, pp. 227\u201033."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220410518810","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220410518810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:48Z","timestamp":1753402128000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/12\/1\/27-44\/390106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2]]}},"alternative-id":["10.1108\/09685220410518810"],"URL":"https:\/\/doi.org\/10.1108\/09685220410518810","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2004,2]]}}}