{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:47:19Z","timestamp":1768344439365,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1145\/2801948.2802001","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"156-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An automated network intrusion process and countermeasures"],"prefix":"10.1145","author":[{"given":"Valkaniotis","family":"Tilemachos","sequence":"first","affiliation":[{"name":"Technological Educational Institute of Crete"}]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[{"name":"Technological Educational Institute of Crete"}]}],"member":"320","published-online":{"date-parts":[[2015,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"5","volume":"15","author":"Apache Apache Tomcat","year":"2015","unstructured":"Apache , \" Apache Tomcat ,\" {Online}. Available: http:\/\/tomcat.apache.org\/. { Accessed 15 5 2015 }. Apache, \"Apache Tomcat,\" {Online}. Available: http:\/\/tomcat.apache.org\/. {Accessed 15 5 2015}.","journal-title":"Accessed"},{"key":"e_1_3_2_1_2_1","unstructured":"C. J. Marquez \"An Analysis of the IDS Penetration Tool: Metasploit \" {Online}. Available: http:\/\/www.infosecwriters.com\/text_resources\/pdf\/jmarquez_Metasploit.pdf.  C. J. Marquez \"An Analysis of the IDS Penetration Tool: Metasploit \" {Online}. Available: http:\/\/www.infosecwriters.com\/text_resources\/pdf\/jmarquez_Metasploit.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"CVE \"Common Vulnerabilities and Exposures \" {Online}. Available: http:\/\/cve.mitre.org\/cgibin\/cvename.cgi?name=CVE-2009-4188.  CVE \"Common Vulnerabilities and Exposures \" {Online}. Available: http:\/\/cve.mitre.org\/cgibin\/cvename.cgi?name=CVE-2009-4188."},{"key":"e_1_3_2_1_4_1","volume-title":"Nmap Project","author":"Lyon Nmap Network","year":"2009","unstructured":"G. Lyon , Nmap Network Scanning : The Official Nmap Project Guide to Network Discovery and Security Scanning , Nmap Project , 2009 . G. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Nmap Project, 2009."},{"key":"e_1_3_2_1_5_1","first-page":"5","volume":"15","author":"v. Rossum Python Documentation","year":"2015","unstructured":"G. v. Rossum , \" Python Documentation ,\" {Online}. Available: https:\/\/docs.python.org\/2\/library\/os.html. { Accessed 15 5 2015 }. G. v. Rossum, \"Python Documentation,\" {Online}. Available: https:\/\/docs.python.org\/2\/library\/os.html. {Accessed 15 5 2015}.","journal-title":"Accessed"},{"key":"e_1_3_2_1_6_1","first-page":"5","volume":"16","author":"v. Rossum Python","year":"2015","unstructured":"G. v. Rossum , \" Python ,\" {Online}. Available: https:\/\/www.python.org\/. { Accessed 16 5 2015 }. G. v. Rossum, \"Python,\" {Online}. Available: https:\/\/www.python.org\/. {Accessed 16 5 2015}.","journal-title":"Accessed"},{"key":"e_1_3_2_1_7_1","unstructured":"H. Moore \"Metasploit \" {Online}. Available: www.metasploit.com.  H. Moore \"Metasploit \" {Online}. Available: www.metasploit.com."},{"key":"e_1_3_2_1_8_1","unstructured":"H. Moore \"Metasploitable \" {Online}. Available: https:\/\/community.rapid7.com\/docs\/DOC-1875.  H. Moore \"Metasploitable \" {Online}. Available: https:\/\/community.rapid7.com\/docs\/DOC-1875."},{"key":"e_1_3_2_1_9_1","unstructured":"H. Moore \"Six Ways to Automate Metasploit \" {Online}. Available: https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2011\/12\/08\/six-ways-to-automate-metasploit.  H. Moore \"Six Ways to Automate Metasploit \" {Online}. Available: https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2011\/12\/08\/six-ways-to-automate-metasploit."},{"key":"e_1_3_2_1_10_1","unstructured":"jduck \"rapid7 \" {Online}. Available: http:\/\/www.rapid7.com\/db\/modules\/exploit\/multi\/http\/tomcat_mgr_deploy.  jduck \"rapid7 \" {Online}. Available: http:\/\/www.rapid7.com\/db\/modules\/exploit\/multi\/http\/tomcat_mgr_deploy."},{"key":"e_1_3_2_1_11_1","unstructured":"Kaspersky \"2014 Security Bulletin \" {Online}. Available: https:\/\/securelist.com\/files\/2014\/12\/Kaspersky-Security-Bulletin-2014-EN.pdf. {Accessed 16 5 2015}.  Kaspersky \"2014 Security Bulletin \" {Online}. Available: https:\/\/securelist.com\/files\/2014\/12\/Kaspersky-Security-Bulletin-2014-EN.pdf. {Accessed 16 5 2015}."},{"key":"e_1_3_2_1_12_1","unstructured":"M. Cantoni \"Rapid 7 \" {Online}. Available: http:\/\/www.rapid7.com\/db\/modules\/auxiliary\/admin\/http\/tomcat_administration.  M. Cantoni \"Rapid 7 \" {Online}. Available: http:\/\/www.rapid7.com\/db\/modules\/auxiliary\/admin\/http\/tomcat_administration."},{"key":"e_1_3_2_1_13_1","volume-title":"McGraw-Hill Osborne Media","author":"Mcclure Scambray","year":"2011","unstructured":"Mcclure , Scambray and Kurtz , Hacking Exposed 7 , McGraw-Hill Osborne Media , 2011 . Mcclure, Scambray and Kurtz, Hacking Exposed 7, McGraw-Hill Osborne Media, 2011."},{"key":"e_1_3_2_1_14_1","unstructured":"Navigant \"2014 Cyber security Trends \" {Online}. Available: http:\/\/www.navigant.com\/insights\/hottopics\/technology-solutions-experts-corner\/cyber-security-trends-2014-part-1\/. {Accessed 15 5 2015}.  Navigant \"2014 Cyber security Trends \" {Online}. Available: http:\/\/www.navigant.com\/insights\/hottopics\/technology-solutions-experts-corner\/cyber-security-trends-2014-part-1\/. {Accessed 15 5 2015}."},{"key":"e_1_3_2_1_15_1","unstructured":"P. Passeri \"hackmageddon \" {Online}. Available: http:\/\/hackmageddon.com\/?s=march+2015+timeline. {Accessed 23 4 2015}.  P. Passeri \"hackmageddon \" {Online}. Available: http:\/\/hackmageddon.com\/?s=march+2015+timeline. {Accessed 23 4 2015}."},{"key":"e_1_3_2_1_16_1","unstructured":"w3techs {Online}. Available: http:\/\/w3techs.com\/technologies\/details\/ws-tomcat\/all\/all.  w3techs {Online}. Available: http:\/\/w3techs.com\/technologies\/details\/ws-tomcat\/all\/all."},{"key":"e_1_3_2_1_17_1","first-page":"5","volume":"16","author":"Wikipedia Common Vulnerabilities","year":"2015","unstructured":"Wikipedia , \" Common Vulnerabilities and Exposures ,\" {Online}. Available: http:\/\/en.wikipedia.org\/wiki\/Common_Vulnerabilities_and_ Exposures . { Accessed 16 5 2015 }. Wikipedia, \"Common Vulnerabilities and Exposures,\" {Online}. Available: http:\/\/en.wikipedia.org\/wiki\/Common_Vulnerabilities_and_Exposures. {Accessed 16 5 2015}.","journal-title":"Accessed"}],"event":{"name":"PCI '15: 19th Panhellenic Conference on Informatics","location":"Athens Greece","acronym":"PCI '15"},"container-title":["Proceedings of the 19th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801948.2802001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:29Z","timestamp":1750223249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":17,"alternative-id":["10.1145\/2801948.2802001","10.1145\/2801948"],"URL":"https:\/\/doi.org\/10.1145\/2801948.2802001","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"2015-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}