{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:09:31Z","timestamp":1775081371947,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/cit.2008.4594714","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T18:40:13Z","timestamp":1218652813000},"page":"432-437","source":"Crossref","is-referenced-by-count":7,"title":["An overview of recent advances in intrusion detection"],"prefix":"10.1109","author":[{"given":"Mohd Fadzli","family":"Marhusin","sequence":"first","affiliation":[{"name":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia"}]},{"given":"David","family":"Cornforth","sequence":"additional","affiliation":[{"name":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia"}]},{"given":"Henry","family":"Larkin","sequence":"additional","affiliation":[{"name":"School of ITEE, The University of New South Wales at Australian Defence Force Academy, Canberra 2600 ACT, Australia"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/ENABL.2002.1029996","article-title":"preemptive distributed intrusion detection using mobile agents","author":"chan","year":"2002","journal-title":"Proceedings of Eleventh IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprises (WET ICE 2002)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/9780470058411"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2005.1452414"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD-SAWN.2005.31"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286488"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379535"},{"key":"11","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"intrusion detection using sequences of system calls","volume":"6","author":"forrest","year":"1998","journal-title":"Computers & Security"},{"key":"12","author":"crosbie","year":"1995","journal-title":"Applying Geneting programming to Intrusion detection"},{"key":"21","first-page":"240","article-title":"agent-based distributed intrusion alert system","author":"ghosh","year":"2004","journal-title":"Distributed Computing"},{"key":"20","first-page":"229","article-title":"multiagent network security system using fipa-os","author":"peddireddy","year":"2002","journal-title":"IEEE Proceedings on Southeastcon"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2005.34"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72830-6_48"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00136-5"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_17"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2005.78"},{"key":"27","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","article-title":"an analysis of the 1999 darpa\/lincoln laboratory evaluation data for network anomaly detection","author":"mahoney","year":"2003","journal-title":"Recent Advances in Intrusion Detection"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2003.1274254"},{"key":"29","article-title":"a data mining approach for database intrusion detection","author":"yi","year":"2004","journal-title":"Proceedings of the 2004 ACM Symposium on Applied Computing"},{"key":"3","article-title":"intrusion detection techniques","author":"ning","year":"2003","journal-title":"H Bidgoli (Ed ) The Internet Encyclopedia"},{"key":"2","article-title":"statistics on federal incident reports","year":"2004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.iy.12.040194.005015"},{"key":"1","year":"2007","journal-title":"CERT Statistics"},{"key":"30","first-page":"14","author":"gong","year":"2003","journal-title":"Next Generation Intrusion Detection Systems (IDS)"},{"key":"7","year":"0"},{"key":"6","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-45474-8_11","article-title":"experiences with specification-based intrusion detection","author":"uppuluri","year":"2001","journal-title":"Recent Advances in Intrusion Detection 4th International Symposium RAID 2001 Davis CA USA October 10-12 2001 Proceedings"},{"key":"5","author":"sourcefire","year":"2007","journal-title":"Snort Downloads"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329705"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"}],"event":{"name":"2008 8th IEEE International Conference on Computer and Information Technology (CIT)","location":"Sydney, NSW, Australia","start":{"date-parts":[[2008,7,8]]},"end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 8th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586225\/4594630\/04594714.pdf?arnumber=4594714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:07:32Z","timestamp":1775074052000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4594714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cit.2008.4594714","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}