{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:15:16Z","timestamp":1730301316381,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777803","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:35:39Z","timestamp":1481574939000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence"],"prefix":"10.1109","author":[{"given":"Nazimuddin","family":"Sheikh","sequence":"first","affiliation":[]},{"given":"Kanyasree","family":"Mustafi","sequence":"additional","affiliation":[]},{"given":"Indraneel","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"KDD Cup'99 Data","year":"0","key":"ref30"},{"key":"ref10","first-page":"73","article-title":"Experience with EMERALD to date","author":"neumann","year":"1999","journal-title":"First USENIX Workshop on Intrusion Detection and Network Monitoring"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1991.213016"},{"key":"ref12","article-title":"GASSATA: a genetic algorithm as an alternative tool for security audit trails analysis","volume":"8","author":"ludovic","year":"1998","journal-title":"First International Workshop on the Recent Advances in Intrusion Detection"},{"journal-title":"Modern intrusion detection data mining and degrees of attack guilt in applications of data mining in computer security","year":"2002","author":"noel","key":"ref13"},{"key":"ref14","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings of the Seventh USENIX Security Symposium (SECURITY '98)"},{"key":"ref15","article-title":"The artificial immune model for network intrusion detection","author":"kim","year":"1999","journal-title":"European Congress on Intelligent Techniques and Soft Computing (EUFIT'99)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.73"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213257"},{"key":"ref18","first-page":"2278","article-title":"Analysis of Various Rules of Exact String Matching Algorithms","volume":"2","author":"bhandari","year":"2013","journal-title":"International Journal of Applied Research and Studies"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380221006"},{"journal-title":"Intrusion Detection","year":"2000","author":"bace","key":"ref4"},{"key":"ref27","first-page":"132","article-title":"RB-Matcher: String Matching Technique","volume":"42","author":"singh chillar","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"journal-title":"Guide to Intrusion and Prevention System (IDPS)","year":"2007","author":"scarfone","key":"ref3"},{"key":"ref6","article-title":"Snort &#x2014; lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th LISA conference of USENIX association"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380100608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref8","first-page":"222","article-title":"An intrusion-detection model","volume":"13","author":"denning","year":"1997","journal-title":"IEEE Trans Software Eng"},{"article-title":"Use of passive network mapping to enhance network intrusion detection","year":"2001","author":"dayiog iu","key":"ref7"},{"key":"ref2","first-page":"762","volume":"20","author":"boyer","year":"1977","journal-title":"A fast string searching algorithm Commun ACM 1977"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130799"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/0206024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FSCS.1990.89532"},{"journal-title":"Algorithms on Strings Trees and Sequences","year":"1997","author":"gustleid","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1147\/rd.312.0249"},{"key":"ref24","first-page":"180","article-title":"Robust Quick String Matching Algorithm for Network Security","volume":"6","author":"yu","year":"2006","journal-title":"International Journal of Computer Science & Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref26","first-page":"2996","article-title":"Comparision of String Matching Algorithms: An Aid To Information Content Security","author":"du","year":"2003","journal-title":"Proceedings of the Second International Conference on Mache Learmng and Cybernetics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610617"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777803.pdf?arnumber=7777803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T08:05:08Z","timestamp":1483603508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777803","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}