{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:18:40Z","timestamp":1725596320058},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166457","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:31:59Z","timestamp":1512671519000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Intruder monitoring system for local networks using Python"],"prefix":"10.1109","author":[{"given":"Ionut-Daniel","family":"Barbu","sequence":"first","affiliation":[]},{"given":"Cristian","family":"Pascariu","sequence":"additional","affiliation":[]},{"given":"Ioan C.","family":"Bacivarov","sequence":"additional","affiliation":[]},{"given":"Sabina-Daniela","family":"Axinte","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Firoiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Technology Innovation Management Review","year":"2015","key":"ref10"},{"key":"ref11","article-title":"Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers","author":"o'connor","year":"2012","journal-title":"Syngress"},{"journal-title":"Engineering Principles for Information Technology Security","year":"2015","key":"ref12"},{"journal-title":"ISO\/IEC 27001 2013","year":"2015","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp078"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2005.07.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.19107\/IJISC.2015.01.06"},{"journal-title":"TIOBE Software Index TIOBE Programming Community Index Python","year":"2015","key":"ref4"},{"journal-title":"Python Docs","year":"0","key":"ref3"},{"journal-title":"ISO\/IEC FIDIS 27005","article-title":"Information technology-Security Techniques-Information security risk management","year":"2008","key":"ref6"},{"journal-title":"Code Complete","year":"2009","author":"mcconnell","key":"ref5"},{"journal-title":"Federal Information Processing Standards (FIPS) 200 Minimum Security Requirements for Federal Information and Information Systems","year":"2015","key":"ref8"},{"journal-title":"Glossary-ENISA","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.19107\/IJISC.2014.02.04"},{"journal-title":"Cyber Kill Chain","year":"2015","key":"ref1"},{"journal-title":"U S Air Force Software Protection Initiative","article-title":"The Three Tenets of Cyber Security","year":"2015","key":"ref9"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166457.pdf?arnumber=8166457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:47:42Z","timestamp":1515433662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8166457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166457","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}