{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:50:42Z","timestamp":1757544642785,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"June","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Ubiquity"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>Intrusion Prevention Systems are an important component of IT systems defense, and without this technology our data and our networks are much more susceptible to malicious activities.<\/jats:p>","DOI":"10.1145\/1071916.1071927","type":"journal-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:18:59Z","timestamp":1254853139000},"page":"2-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion prevention systems"],"prefix":"10.1145","volume":"2005","author":[{"given":"Nick","family":"Ierace","sequence":"first","affiliation":[{"name":"Western Connecticut State University"}]},{"given":"Cesar","family":"Urrutia","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Bassett","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2005,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"1\n  .  Desai Neil. Intrusion Prevention Systems: the Next Step in the Evolution of IDS. Accessed on February 5 2005. Available at http:\/\/www.securityfocus.com\/infocus\/1670  1. Desai Neil. Intrusion Prevention Systems: the Next Step in the Evolution of IDS. Accessed on February 5 2005. Available at http:\/\/www.securityfocus.com\/infocus\/1670"},{"key":"e_1_2_1_2_1","unstructured":"2\n  .  Stonesoft. Winning the Battle Against False Positives. Accessed on February 13 2005. Available at http:\/\/www.stonesoft.com\/files\/products\/StoneGate\/SGWP_WinningTheBattleAgainstFalsePositives  2. Stonesoft. Winning the Battle Against False Positives. Accessed on February 13 2005. Available at http:\/\/www.stonesoft.com\/files\/products\/StoneGate\/SGWP_WinningTheBattleAgainstFalsePositives"},{"key":"e_1_2_1_3_1","unstructured":"3\n  .  Shepard David. Regional Sales Manager Top Layer Networks. Accessed on February 7 2005. Available at dsheperd@toplayer.com  3. Shepard David. Regional Sales Manager Top Layer Networks. Accessed on February 7 2005. Available at dsheperd@toplayer.com"},{"key":"e_1_2_1_4_1","unstructured":"4\n  .  Mathis M. Fragmentation Considered Very Harmful. Accessed on February 20 2005. Available at http:\/\/www.psc.edu\/~jheffner\/drafts\/draft-mathis-frag-harmful.XX.html  4. Mathis M. Fragmentation Considered Very Harmful. Accessed on February 20 2005. Available at http:\/\/www.psc.edu\/~jheffner\/drafts\/draft-mathis-frag-harmful.XX.html"},{"key":"e_1_2_1_5_1","unstructured":"5\n  .  Top Layer Networks Inc. Case Study Attack Mitigator IPS. Accessed on February 7 2005. Available at http:\/\/www.toplayer.com\/pdf\/widenercase.pdf  5. Top Layer Networks Inc. Case Study Attack Mitigator IPS. Accessed on February 7 2005. Available at http:\/\/www.toplayer.com\/pdf\/widenercase.pdf"},{"key":"e_1_2_1_6_1","volume-title":"Accessed","author":"Sequeria Dinesh","year":"2005","unstructured":"6 . Sequeria , Dinesh . Intrusion Prevention Systems: Security's Silver Bullet ? Accessed February 20, 2005 . Available at http:\/\/cnscenter.future.co.kr\/resource\/security\/ids\/03-03sequeira.pdf 6. Sequeria, Dinesh. Intrusion Prevention Systems: Security's Silver Bullet? Accessed February 20, 2005. Available at http:\/\/cnscenter.future.co.kr\/resource\/security\/ids\/03-03sequeira.pdf"},{"key":"e_1_2_1_7_1","unstructured":"7\n  .  Raja Sanjay. Network Intrusion Prevention. Accessed on February 7 2005. Available at http:\/\/www.toplayer.com\/generic\/TLN_Stateful_WP.pdf  7. Raja Sanjay. Network Intrusion Prevention. Accessed on February 7 2005. Available at http:\/\/www.toplayer.com\/generic\/TLN_Stateful_WP.pdf"},{"key":"e_1_2_1_8_1","volume-title":"Accessed on","author":"Ethan Allen","year":"2005","unstructured":"8 . Ethan Allen . Accessed on February 28, 2005 . Available at http:\/\/www.fortinet.com\/doc\/FGT400ADS.pdf 8. Ethan Allen. Accessed on February 28, 2005. Available at http:\/\/www.fortinet.com\/doc\/FGT400ADS.pdf"},{"key":"e_1_2_1_9_1","unstructured":"9\n  .  Joanne Cummings. Six Ways to Stay Ethical 07\/21\/03 http:\/\/www.nwfusion.com\/you\/2003\/0721ethicsside.html  9. Joanne Cummings. Six Ways to Stay Ethical 07\/21\/03 http:\/\/www.nwfusion.com\/you\/2003\/0721ethicsside.html"}],"container-title":["Ubiquity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1071916.1071927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/ft_gateway.cfm?id=1071927&ftid=322053&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:44Z","timestamp":1750262864000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1071916.1071927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":9,"journal-issue":{"issue":"June","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1071916.1071927"],"URL":"https:\/\/doi.org\/10.1145\/1071916.1071927","relation":{},"ISSN":["1530-2180"],"issn-type":[{"type":"electronic","value":"1530-2180"}],"subject":[],"published":{"date-parts":[[2005,7]]},"assertion":[{"value":"2005-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}