{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:25:39Z","timestamp":1725449139202},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/grc.2005.1547321","type":"proceedings-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T15:49:09Z","timestamp":1134229749000},"page":"401-404 Vol. 2","source":"Crossref","is-referenced-by-count":2,"title":["An e-intelligence approach to e-commerce intrusion detection"],"prefix":"10.1109","author":[{"given":"S.S.","family":"Chang","sequence":"first","affiliation":[]},{"given":"M.S.","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Airline Web Sites Seen as Riddled with Security Holes","year":"2002","author":"verton","key":"13"},{"journal-title":"Honeytokens The Other Honeypof","year":"2003","author":"spitzner","key":"11"},{"journal-title":"\"The Art of War \" 1910","year":"0","author":"sun-tzu","key":"12"},{"key":"3","article-title":"The handshake between PKI and web services","author":"chang","year":"2004","journal-title":"NATEA 2004 Journal"},{"key":"2","article-title":"Distributed open proxy honeypots","author":"barnett","year":"0","journal-title":"Honeypots Project Page"},{"key":"1","article-title":"The blended threat: Preventing computer security's new nemesis","author":"battinelli","year":"2003","journal-title":"Technical Support Magazine"},{"journal-title":"Problems and Challenges with Honeypots","year":"0","author":"spitzner","key":"10"},{"journal-title":"Preventing Brute Force Attacks","year":"2005","author":"leggett","key":"7"},{"key":"6","article-title":"The security of applications: Not all are created equal","author":"jaquith","year":"2002","journal-title":"stake Research Report"},{"key":"5","article-title":"Pharming - A new technique for Internet fraud","author":"de la cuadra","year":"2005","journal-title":"eChannelLine Canada"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2003.1245404"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821538"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00305-X"}],"event":{"name":"2005 IEEE International Conference on Granular Computing","start":{"date-parts":[[2005,7,27]]},"location":"Beijing, China","end":{"date-parts":[[2005,7,27]]}},"container-title":["2005 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10381\/33011\/01547321.pdf?arnumber=1547321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:55:16Z","timestamp":1489535716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1547321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/grc.2005.1547321","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}