{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:41:03Z","timestamp":1730259663303,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675357","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T15:58:59Z","timestamp":1386172739000},"page":"277-282","source":"Crossref","is-referenced-by-count":3,"title":["Framework for distributed and self-healing hybrid intrusion detection and prevention system"],"prefix":"10.1109","author":[{"given":"Fauzia","family":"Idrees","sequence":"first","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"A.Y.","family":"Memon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/INDIN.2008.4618168"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ICCSN.2010.56"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ICIECS.2009.5366474"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/EBISS.2010.5473646"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"11","first-page":"552","article-title":"Multi-level intrusion detection system and log management in cloud computing","author":"jun-ho","year":"2011","journal-title":"13th Int Conf on Advanced Communication Technology"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ITAP.2011.6006397"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"2","first-page":"211","article-title":"Parallel misuse and anomaly detection model","volume":"14","author":"goel","year":"2012","journal-title":"Int J Network Security"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/j.comnet.2007.02.001"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TLA.2011.6030997"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/RAIT.2012.6194493"},{"key":"6","first-page":"1","article-title":"Baysian classifier and snort based network intrusion detection system in cloud computing","volume":"2012","author":"chirag","year":"0","journal-title":"Third Int Conf Computing Communication and Networking Tech"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/ICBBT.2010.5478935"},{"key":"4","first-page":"586","article-title":"Integrating network misuse and anomaly prevention","author":"penya","year":"2008","journal-title":"6th IEEE Int Conf Ind Informatics South Korea"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.5121\/ijccsa.2012.2601"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TrustCom.2012.46"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"JEJU ISLAND, Korea (South)","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675357.pdf?arnumber=6675357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:15:26Z","timestamp":1490210126000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675357","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}