{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:33:26Z","timestamp":1730306006081,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/wocn.2012.6335544","type":"proceedings-article","created":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T20:32:30Z","timestamp":1351110750000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Automated multilevel defence model to investigate packets for web interface"],"prefix":"10.1109","author":[{"given":"Seema","family":"Verma","sequence":"first","affiliation":[]},{"given":"Tanya","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.03.005"},{"journal-title":"Honeypot-based Forensics","year":"0","author":"pouget","key":"17"},{"journal-title":"Client-Side Threats and A Honeyclient-Based Defense Mechanism Honeyscout","year":"2009","author":"clementson","key":"18"},{"year":"0","key":"15"},{"journal-title":"Honeypot in Network Security","year":"2010","author":"akkaya","key":"16"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_2"},{"year":"0","key":"12"},{"key":"21","first-page":"410","article-title":"Honeyware: A Web Based Low Interaction Client Honeypot","author":"yaser","year":"2010","journal-title":"IEEE International Conference on Software Testing Verification and Validation Workshops"},{"key":"20","first-page":"612","article-title":"Honeypot Based Secure Network System","volume":"3","author":"jain","year":"2011","journal-title":"International Journal of Computational Engineering Science"},{"key":"22","first-page":"84","article-title":"Research on Intrusion Detection and Response: A Survey","volume":"1","author":"kabiri","year":"2005","journal-title":"International Journal of Security and Networks"},{"key":"23","article-title":"Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration","volume":"3","author":"nor","year":"2006","journal-title":"Issues in Informing Science and Information Technology"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1115\/1.859711.paper35"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.42"},{"journal-title":"Programming Web Services with SOAP","year":"2001","author":"james","key":"3"},{"key":"2","first-page":"190","author":"vachon","year":"2008","journal-title":"Accessing the Wan"},{"journal-title":"Know Your Enemy Malicious Web Servers","year":"2007","author":"seifort","key":"10"},{"journal-title":"Security Technologies Internetworking Technologies Handbook","first-page":"1","year":"0","key":"1"},{"journal-title":"Honeytokens The Other Honeypot","year":"2003","author":"spitzner","key":"7"},{"journal-title":"Simulating Cyber Attacks Defences and Consequences","year":"0","author":"cohen","key":"6"},{"journal-title":"Top Ten Web Attacks","year":"2002","author":"shah","key":"5"},{"journal-title":"SGI Warns of Web Server Vulnerability","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.266"},{"journal-title":"Know Your Enemy Defining Virtual Honeynets","year":"2003","key":"8"}],"event":{"name":"2012 Ninth International Conference on Wireless and Optical Communications Networks - (WOCN)","start":{"date-parts":[[2012,9,20]]},"location":"Indore, India","end":{"date-parts":[[2012,9,22]]}},"container-title":["2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6325179\/6331881\/06335544.pdf?arnumber=6335544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:48:28Z","timestamp":1490140108000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6335544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wocn.2012.6335544","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}