{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:06:34Z","timestamp":1729641994996,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2003.1192971","type":"proceedings-article","created":{"date-parts":[[2003,12,22]],"date-time":"2003-12-22T17:34:10Z","timestamp":1072114450000},"page":"704-709","source":"Crossref","is-referenced-by-count":0,"title":["SecureDirect: proactive security through content based traffic control"],"prefix":"10.1109","author":[{"given":"J.","family":"Stevens","sequence":"first","affiliation":[]},{"given":"S.","family":"Saniepour","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1999-7103","article-title":"NetST: A Network-based Intrusion Detection System","volume":"7","author":"vigna","year":"1999","journal-title":"Journal of Computer Security"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1999-7102","article-title":"Identification of Host Audit Data to Detect Attacks on Low-level IP","volume":"7","author":"daniels","year":"1999","journal-title":"Journal of Computer Security"},{"key":"ref10","article-title":"Snort-Ligthweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA&#x2019;99 13th System Administration Conference"},{"journal-title":"Honeypot Project","year":"0","key":"ref6"},{"key":"ref11","article-title":"Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection","author":"thomas","year":"1998","journal-title":"Technical Report"},{"journal-title":"Hogwash","year":"0","key":"ref5"},{"key":"ref8","first-page":"671","article-title":"Network Based Intrusion Detection: A Review of Technology Computers & Security","volume":"18","author":"richards","year":"1999","journal-title":"Denmac Systems Inc 650 Academy Drive"},{"article-title":"An Introduction to Gateway Intrusion Detection","year":"0","author":"haile","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924296"},{"journal-title":"ManTrap","year":"0","key":"ref9"},{"article-title":"Secrets and Lies: Digital Security in a Networked World","year":"2000","author":"schnier","key":"ref1"}],"event":{"name":"17th International Conference on Advanced Information Networking and Applications. AINA 2003","acronym":"AINA-03","location":"Xi'an, China"},"container-title":["17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8485\/26745\/01192971.pdf?arnumber=1192971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,31]],"date-time":"2018-03-31T10:05:43Z","timestamp":1522490743000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/aina.2003.1192971","relation":{},"subject":[]}}