{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:11:14Z","timestamp":1725491474004},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754756"},{"type":"electronic","value":"9783540754763"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75476-3_35","type":"book-chapter","created":{"date-parts":[[2007,9,17]],"date-time":"2007-09-17T16:37:49Z","timestamp":1190047069000},"page":"344-353","source":"Crossref","is-referenced-by-count":0,"title":["ATPS \u2013 Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response"],"prefix":"10.1007","author":[{"given":"Byoungkoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seungyong","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Jintae","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1007\/978-3-540-24768-5_63","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"B.-K. Kim","year":"2004","unstructured":"Kim, B.-K., Kim, I.-K., Kim, K.-Y., Jang, J.-S.: Design and Implementation of High-Performance Intrusion Detection System. In: Lagan\u00e0, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 594\u2013602. Springer, Heidelberg (2004)"},{"key":"35_CR2","first-page":"266","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"C. Kruegel","year":"2002","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 266\u2013274. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"35_CR3","unstructured":"ISS. RealSecure Gigabit Network Sensor (September 2002), \n \n http:\/\/www.iss.net\/products_services\/enterprise_protection\/rsnetwork\/gigabitsensor.php"},{"key":"35_CR4","unstructured":"Symantec. ManHunt (2002), \n \n http:\/\/enterprisesecurity.symantec.com\/products\/products.cfm?ProductID=156"},{"key":"35_CR5","unstructured":"CISCO. CISCO Intrusion Detection System. Technical Information (November 2001)"},{"key":"35_CR6","unstructured":"Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA 1999 Conference (November 1999)"},{"key":"35_CR7","unstructured":"Ranum, M.: Burglar Alarms for Detecting Intrusions, NFR Inc. (1999)"},{"key":"35_CR8","unstructured":"Ptacek, T., Newsham, T.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks Inc. (1998)"},{"key":"35_CR9","unstructured":"Debar, H., Dacier, M., Wespi, A.: Research Report Towards a Taxonomy of Intrusion Detection Systems, Technical Report RZ 3030, IBM Research Division, Zurich Research Laboratory (June 1998)"},{"key":"35_CR10","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th National Computer Security Conference, pp. 11\u201321 (October 1994)"},{"key":"35_CR11","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system(NIDES), Technical Report SRI-CLS-95-07 (May 1995)"},{"key":"35_CR12","unstructured":"Kumar, S.: Classification and Detection of Computer Intrusions, Phd, Purdue University (1995)"},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/1244002.1244068","volume-title":"Proceedings of the 2007 ACM Symposium on Applied Computing","author":"S. Yi","year":"2007","unstructured":"Yi, S., Kim, B.-k., Oh, J., Jang, J., Kesidis, G., Das, C.R.: Memory-Efficient Content Filtering Hardware for High-Speed Intrusion Detection Systems. In: Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea, March 11-15, pp. 264\u2013269. ACM Press, New York (2007)"},{"key":"35_CR14","unstructured":"http:\/\/www.ixiacom.com"},{"key":"35_CR15","unstructured":"http:\/\/www.blasdesoftware.net"},{"key":"35_CR16","unstructured":"http:\/\/www.nessus.org"}],"container-title":["Lecture Notes in Computer Science","Managing Next Generation Networks and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75476-3_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:02:27Z","timestamp":1619521347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75476-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540754756","9783540754763"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75476-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}