{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:11:16Z","timestamp":1742638276834,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/infosec.2015.7435523","type":"proceedings-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T18:37:31Z","timestamp":1458585451000},"page":"165-170","source":"Crossref","is-referenced-by-count":17,"title":["Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2"],"prefix":"10.1109","author":[{"given":"Ar Kar","family":"Kyaw","sequence":"first","affiliation":[]},{"family":"Yuzhu Chen","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Joseph","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Comparison of Open Source Network Intrusion Detection Systems","author":"taft?rodfoss","year":"2011","journal-title":"University of Oslo"},{"key":"ref11","first-page":"1","article-title":"SNORT: An open source network Security tool for intrusion detection in campus network environment","volume":"2","author":"rani","year":"2012","journal-title":"International Journal of Computer Technology and Electronics Engineering (IJCTEE)"},{"year":"0","key":"ref12","article-title":"Snort Blog: Snort 2.9.7.3 is now available!"},{"key":"ref13","first-page":"3290","article-title":"Intrusion detection techniques and open source intrusion detection (IDS) tools","volume":"2","author":"pir","year":"2014","journal-title":"Int J Eng Research & Development"},{"year":"0","key":"ref14","article-title":"A Bro Performance Benchmark"},{"year":"0","key":"ref15","article-title":"How To Install Bro-IDS 2.2 on Ubuntu 12.04"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614355"},{"key":"ref17","article-title":"Implementation and evaluation of a low-cost intrusion detection system for community wireless mesh networks","author":"quibell","year":"2015","journal-title":"University of Saskatchewan Electrical"},{"article-title":"IDS on Raspberry Pi: A performance evaluation","year":"2015","author":"aspern\u00e4s","key":"ref18"},{"key":"ref19","first-page":"65","article-title":"A practical approach for the detection of DDoS attack and its countermeasure selection in Open Stack using Xen Cloud Server","volume":"3","author":"sruthi","year":"2015","journal-title":"Cloud Server International Journal of Engineering Research and General Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_9"},{"key":"ref3","first-page":"36","article-title":"Acquisition of evidence from network intrusion detection systems","author":"cusack","year":"2013","journal-title":"Australian Digital Forensics Conference"},{"journal-title":"Instructab1es","article-title":"Raspberry Pi Firewall and Intrusion Detection System","year":"0","key":"ref6"},{"journal-title":"Implementing Cisco IOS Network Security (IINS 640&#x2013;554)","year":"2012","author":"paquet","key":"ref5"},{"key":"ref8","article-title":"How To Configure A Snort IDS Intrusion Detection System On Debian Linux","author":"parkansky","year":"0","journal-title":"Aboutdebian"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4208"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.05.002"},{"key":"ref1","first-page":"383","article-title":"A brief study and comparison of Snort and Bro open source network intrusion detection systems","volume":"1","author":"mehra","year":"2012","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"year":"0","key":"ref9","article-title":"Suricata-vs-snort-aldeid"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.103"}],"event":{"name":"2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)","start":{"date-parts":[[2015,11,15]]},"location":"Cape Town","end":{"date-parts":[[2015,11,17]]}},"container-title":["2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7431308\/7435496\/07435523.pdf?arnumber=7435523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,2]],"date-time":"2020-02-02T17:00:16Z","timestamp":1580662816000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7435523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/infosec.2015.7435523","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}