{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T19:44:28Z","timestamp":1767383068406,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/isads.2013.6513420","type":"proceedings-article","created":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T17:39:38Z","timestamp":1368207578000},"page":"1-6","source":"Crossref","is-referenced-by-count":43,"title":["Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications"],"prefix":"10.1109","author":[{"given":"Abdul","family":"Razzaq","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Hur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H Farooq","family":"Ahmad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muddassar","family":"Masood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Business communication Process and product Cengage Learning","year":"2008","author":"guffey","key":"ref39"},{"journal-title":"Imperva Secure Sphere The First Dynamic Profiling Firewall WWW page","year":"2011","key":"ref38"},{"journal-title":"An ontology of information security","year":"0","author":"herzog","key":"ref33"},{"key":"ref32","article-title":"XML-signature syntax and processing","volume":"12","author":"bartel","year":"2002","journal-title":"W3C Recommendation"},{"key":"ref31","article-title":"Target Centric Ontology for Intrusion Detection","author":"john","year":"2004","journal-title":"Proc IJCAI 03 Workshop Ontologies and Distributed Systems"},{"journal-title":"Daml Org Daml Oil WWW page","year":"2000","key":"ref30"},{"journal-title":"F5 Networks Four reasons not to use ModSecurity WWW page","year":"2008","key":"ref37"},{"journal-title":"ModSecurity Mod Security Open Source Web Application Firewall WWW page","year":"2011","key":"ref36"},{"journal-title":"Securitytoollist com Vulnerability Scanners WWW page","year":"2011","key":"ref35"},{"journal-title":"Information Security Fortification by Ontological Mapping of the ISO\/IEC 27001 Standard","year":"2008","author":"fenz","key":"ref34"},{"journal-title":"CYBER CRIME by Parthasarathi Pati WWW page","year":"2011","author":"pati","key":"ref10"},{"journal-title":"firewall WWW page","year":"2011","author":"mitchell","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.79"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.611"},{"key":"ref13","first-page":"762","volume":"10","author":"boyer","year":"1977","journal-title":"A Fast String Searching Algorithm[J] Commun ACM"},{"key":"ref14","first-page":"40","volume":"11","author":"guha","year":"1997","journal-title":"Network security via reverse engineering of TCP code vulnerability analysis and proposed solutions Network IEEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233707"},{"key":"ref16","first-page":"229","article-title":"Snort lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration"},{"key":"ref17","article-title":"WSF: An HTTP level Firewall for Hardening Web Servers. In Parallel and Distributed Computing and Systems","author":"zhao","year":"2005","journal-title":"17th IASTED International Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2006.34"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2011.19"},{"article-title":"A taxonomy of computer attacks with applications to wireless networks","year":"2001","author":"lough","key":"ref28"},{"key":"ref4","volume":"1","author":"justice","year":"1999","journal-title":"INVESTIGATION F B Parent's Guide to Internet Safety Compiler 19"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100001"},{"journal-title":"FBI Speaches","year":"2010","author":"chabinsky","key":"ref3"},{"journal-title":"Find A Cybercrime Defense Attorney WWW page","year":"2010","key":"ref6"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-540-39718-2_22","article-title":"Security for daml web services: Annotation and matchmaking","author":"denker","year":"2003","journal-title":"The Semantic Web-ISWC 2003"},{"journal-title":"OWASP Top Ten Project","year":"2010","key":"ref5"},{"journal-title":"Cyber Crime New Challenge to Mankind Society Introduction to the Nature of Cyber Crime and its Investigation Process","year":"2011","author":"grpoup","key":"ref8"},{"journal-title":"Cybercrime Defined WWW page","year":"2009","author":"nelson","key":"ref7"},{"article-title":"Time to attack cybercrime with a strong security policy","year":"2010","author":"dupont","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1080\/03071847.2011.606640","article-title":"The 'Other'Global Security Challenges","volume":"156","author":"zala","year":"2011","journal-title":"The RUSI Journal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11522-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref22","first-page":"232","article-title":"Intrusion Detection using Data Mining Techniques","author":"reddyl","year":"2004","journal-title":"Proceedings of Artificial Intelligence and Applications (AIA-2004)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11540007_39"},{"journal-title":"Web Application Firewalls Defense in Depth for Your Web Infrastructure WWW page","year":"2009","author":"beechey","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508180"},{"journal-title":"Detection and Evasion of Web Application Attacks WWW page","year":"2004","author":"mookhey","key":"ref41"},{"key":"ref23","article-title":"Multi Layered framework for distributed data mining","author":"serazi","year":"2004","journal-title":"proceedings of the 13th International Conference on Intelligent & Adaptive Systems and Software Engineering (IASSE'04)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/503339.503342"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2009.4909223"}],"event":{"name":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2013,3,6]]},"location":"Mexico City, Mexico","end":{"date-parts":[[2013,3,8]]}},"container-title":["2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6510013\/6513393\/06513420.pdf?arnumber=6513420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T08:52:21Z","timestamp":1498035141000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6513420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/isads.2013.6513420","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}