{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:32:41Z","timestamp":1729657961038,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194946","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"128-130","source":"Crossref","is-referenced-by-count":0,"title":["Dependable Intrusion Tolerance: technology demo"],"prefix":"10.1109","volume":"2","author":[{"given":"A.","family":"Valdes","sequence":"first","affiliation":[]},{"given":"M.","family":"Almgren","sequence":"additional","affiliation":[]},{"given":"S.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Deswarte","sequence":"additional","affiliation":[]},{"given":"B.","family":"Dutertre","sequence":"additional","affiliation":[]},{"given":"J.","family":"Levy","sequence":"additional","affiliation":[]},{"given":"H.","family":"Saidi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Stavridou","sequence":"additional","affiliation":[]},{"given":"T.E.","family":"Uribe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/S1571-0661(04)80580-2","article-title":"Combining monitors for run-time system verification","volume":"70","author":"levy","year":"2002","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"ref6","first-page":"353","article-title":"EMERALD: Event monitoring enabling responses to anomalous live disturbances","author":"porras","year":"1997","journal-title":"Proceedings of the 20th National Information Systems Security Conference"},{"key":"ref5","article-title":"Code Red","author":"permeh","year":"2001","journal-title":"worm Security Advisory AL20010717 eEye Digital Security"},{"key":"ref8","first-page":"54","article-title":"Adaptive, model-based monitoring for cyber attack detection","volume":"1907","author":"valdes","year":"2000","journal-title":"Proceedings of the Recent Advances in Intrusion Detection (RAID 2000)"},{"key":"ref7","article-title":"An architecture for an adaptive intrusion tolerant server","author":"valdes","year":"2002","journal-title":"Security Protocols Workshop"},{"key":"ref2","first-page":"c-8-1","article-title":"Design assurance arguments for intrusion tolerance","author":"dawson","year":"2002","journal-title":"Workshop on Intrusion Tolerant Systems DSN 2002"},{"key":"ref1","first-page":"63","article-title":"Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proc 7th USENIX Security Conference"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194946.pdf?arnumber=1194946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T14:11:30Z","timestamp":1705068690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194946","relation":{},"subject":[]}}