{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:50:03Z","timestamp":1725461403558},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/hpcsim.2014.6903739","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T17:29:42Z","timestamp":1412011782000},"page":"584-587","source":"Crossref","is-referenced-by-count":0,"title":["Open science, open security"],"prefix":"10.1109","author":[{"given":"Scott","family":"Campbell","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"16","article-title":"Cluster Security as a Unique Problem with Emergent Properties: And Techniques","author":"yurcik","year":"2004","journal-title":"5th LCI International Conference on Linux Clusters Presentation"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2002.1137790"},{"journal-title":"SUSE Linux Enterprise Server Security Guide","year":"0","key":"14"},{"journal-title":"Security in HPC Centres","year":"0","author":"nomin\ufffd","key":"11"},{"key":"12","article-title":"Bro: A system for detecting network intruders in real-time","author":"paxson","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"3","article-title":"Local system security via SSHD instrumentation","author":"campbell","year":"2011","journal-title":"Proc 19th Large Installation System Administration Conference"},{"journal-title":"Experiences with Intrusion Detection in High Performance Computing","year":"2012","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4812323"},{"journal-title":"A Security Architecture for High Performance Computing Facilities","year":"2006","author":"mcmahon","key":"10"},{"key":"7","article-title":"Shunting: A hardware\/software architecture for flexible, high-performance network intrusion prevention","author":"gonzalez","year":"2007","journal-title":"Proc ACM CCS"},{"journal-title":"Linux Auditd Main Page","year":"0","author":"grubb","key":"6"},{"key":"5","article-title":"Shunting: A hardware\/software architecture for flexible","author":"gonzalez","year":"2007","journal-title":"High-Performance Network Intrusion Prevention Proc ACM CCS"},{"journal-title":"Stringencoders A Collection of High Performance Cstring Transformations","year":"0","author":"galbreath","key":"4"},{"journal-title":"DOE Systems Biology Knowledgebase","year":"0","key":"9"},{"journal-title":"Repo for Software Referenced in Work","year":"0","key":"8"}],"event":{"name":"2014 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2014,7,21]]},"location":"Bologna, Italy","end":{"date-parts":[[2014,7,25]]}},"container-title":["2014 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895221\/6903651\/06903739.pdf?arnumber=6903739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:47:04Z","timestamp":1490276824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6903739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2014.6903739","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}