{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:04Z","timestamp":1750308784473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741952","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"211-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion prevention systems"],"prefix":"10.1145","author":[{"given":"K. C.","family":"Nalavade","sequence":"first","affiliation":[{"name":"VJTI, Mumbai"}]},{"given":"B. B.","family":"Meshram","sequence":"additional","affiliation":[{"name":"VJTI, Mumbai"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of National Conference on Research &amp; Practices in Current Areas of IT, March 26--27","author":"Meshram B.","year":"2004","unstructured":"B. Meshram and Alok K . Kumar, \"HyIDS: Hybrid Intrusion Detection System \", Proceedings of National Conference on Research &amp; Practices in Current Areas of IT, March 26--27 , 2004 , Department of Computer Science &amp; Engineering, Sant Harchand Sing Longowal Central Institute of Engineering &amp; Technology, Longowal, Dist Sangar(Punjab)-148106 B. Meshram and Alok K. Kumar, \"HyIDS: Hybrid Intrusion Detection System\", Proceedings of National Conference on Research &amp; Practices in Current Areas of IT, March 26--27, 2004, Department of Computer Science &amp; Engineering, Sant Harchand Sing Longowal Central Institute of Engineering &amp; Technology, Longowal, Dist Sangar(Punjab)-148106"},{"key":"e_1_3_2_1_2_1","volume-title":"Sant Harchand Singh Longowal Central Institute of engineering &amp","author":"Meshram B. B.","year":"2004","unstructured":"B. B. Meshram &amp; T. R. Sontakke , \" Object Oriented Database Security\" TCTE --2004 , Sant Harchand Singh Longowal Central Institute of engineering &amp ; Technology, Longowal -- 148106.(Formerly known as SLIET), Dist : Sangrur, Punjab-148106, India, October 15--16, 2004 . B. B. Meshram &amp; T. R. Sontakke, \"Object Oriented Database Security\" TCTE --2004, Sant Harchand Singh Longowal Central Institute of engineering &amp; Technology, Longowal -- 148106.(Formerly known as SLIET), Dist: Sangrur, Punjab-148106, India, October 15--16, 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference Systemics, Cybernetics And Informatics Icsci --","author":"Meshram B. B.","year":"2005","unstructured":"B. B. Meshram , Alok K. Kumar \"SNAD : Statistical Network Anomaly Detector \", International Conference Systemics, Cybernetics And Informatics Icsci -- 2005 , Under The Aegis Of Pentagram Research Centre Pvt. Ltd . January 06--09, 2005 Venue : Dr . Mcr Hrd Institute Of Andhra Pradesh, Hyderabad B. B. Meshram, Alok K. Kumar \"SNAD: Statistical Network Anomaly Detector\", International Conference Systemics, Cybernetics And Informatics Icsci -- 2005, Under The Aegis Of Pentagram Research Centre Pvt. Ltd. January 06--09, 2005 Venue: Dr. Mcr Hrd Institute Of Andhra Pradesh, Hyderabad"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference On Emerging Technologies and Applications In Emerging Technology and Sciences, 13--14","author":"Meshram B. B.","year":"2008","unstructured":"B. B. Meshram , P. B. Ambhore , V. B. Waghmare , \" Network Design Security and Management\" , International Conference On Emerging Technologies and Applications In Emerging Technology and Sciences, 13--14 January 2008 , Computer Science Department, Saurashtra University, Rajkot, Gujarat(India). and Management. B. B. Meshram, P. B. Ambhore, V. B. Waghmare, \"Network Design Security and Management\", International Conference On Emerging Technologies and Applications In Emerging Technology and Sciences, 13--14 January 2008, Computer Science Department, Saurashtra University, Rajkot, Gujarat(India). and Management."},{"key":"e_1_3_2_1_5_1","volume-title":"Computer Science &amp","author":"Meshram B. B.","year":"2004","unstructured":"B. B. Meshram , S. S. Karvande . \" Design And Implementation Of Application Layer Firewall For Secure Internet Access\" at International Conferences on Soft Computing , Department of Computer Applications , Computer Science &amp ; Engineering, Information Technology , Bharath Institute of Higher Education & amp; Research, Chennai, Tamilnadu. May 28th and 29th, 2004 . B. B. Meshram, S. S. Karvande. \"Design And Implementation Of Application Layer Firewall For Secure Internet Access\" at International Conferences on Soft Computing, Department of Computer Applications, Computer Science &amp; Engineering, Information Technology, Bharath Institute of Higher Education &amp; Research, Chennai, Tamilnadu. May 28th and 29th, 2004."},{"volume-title":"Sushil Jajodia, \"Intrusion Detection Techniques\"","author":"Ning Peng","key":"e_1_3_2_1_6_1","unstructured":"Peng Ning , North Carolina State University , Sushil Jajodia, \"Intrusion Detection Techniques\" , George Mason University . Peng Ning, North Carolina State University, Sushil Jajodia, \"Intrusion Detection Techniques\", George Mason University."},{"volume-title":"A Light Intrusion Prevention System in Data Link Layer","author":"Zhao Kuo","key":"e_1_3_2_1_7_1","unstructured":"Kuo Zhao , Fei Ren , Nurbol, Liang Hu. \"LDLB : A Light Intrusion Prevention System in Data Link Layer \", National Natural Science Foundation of China under Grant No. 60473099. Department of Computer Science and Technology, Jilin University , China. Kuo Zhao, Fei Ren, Nurbol, Liang Hu. \"LDLB: A Light Intrusion Prevention System in Data Link Layer\", National Natural Science Foundation of China under Grant No. 60473099. Department of Computer Science and Technology, Jilin University, China."},{"key":"e_1_3_2_1_8_1","volume-title":"Faculty of Computer Science","author":"Dong He Xiao","year":"2008","unstructured":"He Xiao Dong , \" Automated Intrusion Prevention Mechanism in Enhancing Network Security\". Faculty of Computer Science , University of Malay , Kuala Lumpur , March 2008 . He Xiao Dong, \"Automated Intrusion Prevention Mechanism in Enhancing Network Security\". Faculty of Computer Science, University of Malay, Kuala Lumpur, March 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)","author":"Mohamed","year":"2004","unstructured":"Mohamed G. Gouda and Xiang-Yang Alex Liu, \"Firewall Design: Consistency, Completeness, and Compactness \". Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04) 1063-6927\/04 $20.00 \u00a9 2004 IEEE. Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-1188, U.S.A. {gouda,alexg}@cs.utexas.edu Mohamed G. Gouda and Xiang-Yang Alex Liu, \"Firewall Design: Consistency, Completeness, and Compactness\". Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04) 1063-6927\/04 $20.00 \u00a9 2004 IEEE. Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-1188, U.S.A. {gouda,alexg}@cs.utexas.edu"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890115"}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741952"}},"subtitle":["data mining approach"],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":10,"alternative-id":["10.1145\/1741906.1741952","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741952","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}