{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:54:51Z","timestamp":1760043291354},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ideas.2003.1214947","type":"proceedings-article","created":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T14:39:17Z","timestamp":1067611157000},"page":"336-341","source":"Crossref","is-referenced-by-count":10,"title":["Database damage assessment using a matrix based approach: an intrusion response system"],"prefix":"10.1109","author":[{"given":"B.","family":"Panda","sequence":"first","affiliation":[]},{"family":"Jing Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Learning program behavior profiles for intrusion detection","author":"ghosh","year":"1999","journal-title":"Proc 1st USENIX Workshop Intrusion Detection Network Monitoring"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39945-3_4","article-title":"A data mining and CIDF based approach for detecting novel and distributed intrusions","author":"lee","year":"2000","journal-title":"Proceedings of 3rd International Workshop on the Recent Advances in Intrusion Detection"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/372202.372333"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601331"},{"key":"7","article-title":"Sequential damage assessment and recovery using semantic logging","author":"sobhan","year":"2002","journal-title":"Proceeding of 2002 IEEE Workshop on Information Assurance United States Military Academy"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008731200105"},{"journal-title":"Defending America's Cyberspace National Plan for Information System Protection","year":"2000","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.2000.852457"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935047"},{"key":"8","article-title":"Dependency based logging for database survivability from hostile transactions","author":"patnaik","year":"1999","journal-title":"Proc of 12th International Conference Computer Application and Industry Engineering"}],"event":{"name":"International Database Engineering and Applications Symposium","acronym":"IDEAS-03","location":"Hong Kong, China"},"container-title":["Seventh International Database Engineering and Applications Symposium, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8622\/27319\/01214947.pdf?arnumber=1214947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T01:49:19Z","timestamp":1497577759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1214947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ideas.2003.1214947","relation":{},"subject":[]}}