{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T02:27:42Z","timestamp":1649125662527},"reference-count":0,"publisher":"Centro de Innovacion y Desarrollo Tecnologico en Computo","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17562\/pb-34-6","type":"journal-article","created":{"date-parts":[[2015,6,27]],"date-time":"2015-06-27T11:50:20Z","timestamp":1435405820000},"page":"31-33","source":"Crossref","is-referenced-by-count":0,"title":["Sistemas de Detecci\u00f3n de Intrusos (Ids), Seguridad en Internet"],"prefix":"10.17562","volume":"34","author":[{"given":"Mauricio","family":"Olgu\u00edn Carbajal","sequence":"first","affiliation":[]},{"given":"Israel","family":"Rivera Z\u00e1rate","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"P\u00e9rez Romero","sequence":"additional","affiliation":[]}],"member":"7641","published-online":{"date-parts":[[2006,7,31]]},"container-title":["Polibits"],"original-title":[],"deposited":{"date-parts":[[2015,6,27]],"date-time":"2015-06-27T11:50:46Z","timestamp":1435405846000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.polibits.cidetec.ipn.mx\/2006_34\/Sistemas%20de%20Deteccion%20de%20Intrusos%20_Ids__%20Seguridad%20en%20Internet.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,31]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17562\/pb-34-6","relation":{},"ISSN":["2395-8618","1870-9044"],"issn-type":[{"value":"2395-8618","type":"electronic"},{"value":"1870-9044","type":"print"}],"subject":[],"published":{"date-parts":[[2006,7,31]]}}}