{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:15Z","timestamp":1754157675464,"version":"3.41.2"},"reference-count":13,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,5,1]]},"abstract":"<jats:p>Defines and categorizes the types of intrusions that can be made on information systems. Characterizes a good intrusion detection system and examines and compares commercial intrusion detection products. Reports on continuing intrusion detection.<\/jats:p>","DOI":"10.1108\/09685229910265501","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"76-82","source":"Crossref","is-referenced-by-count":3,"title":["An introduction to automated intrusion detection approaches"],"prefix":"10.1108","volume":"7","author":[{"given":"Rod","family":"Hart","sequence":"first","affiliation":[]},{"given":"Darren","family":"Morgan","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Tran","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"unstructured":"Caelli, W. et al. (1991), Information Security Handbook, Macmillan Publishers, New York, NY.","key":"key2022030920235333100_B1"},{"unstructured":"Carroll, J.M. (1996), Computer Security, 3rd ed., Butterworth\u2010Heinemann, Stoenham, MA.","key":"key2022030920235333100_B2"},{"unstructured":"Cothrell, S. (1997), Project Summary: New Technologies in Intrusion Detection, 2 October.","key":"key2022030920235333100_B3"},{"unstructured":"Faulkner Information Services (1999), http\/\/www.faulkner.com\/","key":"key2022030920235333100_B4"},{"unstructured":"Ilgun, K. (1992), USTAT: A Real\u2010time Intrusion Detection System for Unix, Master\u2019s thesis, Computer Science Department, University of California, Santa Barbara, CA, July.","key":"key2022030920235333100_B5"},{"unstructured":"Kumar, S. et al. (1994), \u201cA pattern matching model for misuse intrusion detection\u201d, Department of Computer Sciences, Purdue University, presented at the 17th National Computer Security Conference, Baltimore, MA,  11\u201014 October.","key":"key2022030920235333100_B6"},{"unstructured":"McClure, S. et al. (1998), \u201cDigital sentries\u201d, InfoWorld, International Data Group, 4 May.","key":"key2022030920235333100_B7"},{"unstructured":"NetRanger (1999), http:\/\/www.wheelgroup.com\/netrangr\/1netrang.html\/","key":"key2022030920235333100_B8"},{"unstructured":"Porras, P.A. et al. (1992), \u201cPenetration state transition analysis \u2013 a rule\u2010based intrusion detection approach\u201d, Eighth Annual Computer Security Applications Conference, IEEE Computer Society Press, 30 November\u2010 4 December.","key":"key2022030920235333100_B9"},{"unstructured":"Price, K. (1998), Introduction to Intrusion Detection, Coast Laboratory, Purdue University, last modified September, http:\/\/www.cs. purdue.edu\/coast\/intrusion\u2010dectection\/. (This Web site contains an extensive list of intrusion detection systems, descriptions, and Web locations.)","key":"key2022030920235333100_B10"},{"unstructured":"Scambray, J. et al. (1998), \u201cNetwork security checkup\u201d, InfoWorld, International Data Group, 16 March.","key":"key2022030920235333100_B11"},{"unstructured":"Spafford, E. (1990), The Internet Worm Report, Technical Report 823, Purdue University, February.","key":"key2022030920235333100_B12"},{"unstructured":"Summers, R.C. (1997), Secure Computing [:] Threats and Safeguards. McGraw\u2010Hill,  New York, NY.","key":"key2022030920235333100_B13"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229910265501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910265501\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910265501\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:51Z","timestamp":1753402191000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/7\/2\/76-82\/184585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5,1]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1999,5,1]]}},"alternative-id":["10.1108\/09685229910265501"],"URL":"https:\/\/doi.org\/10.1108\/09685229910265501","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1999,5,1]]}}}