{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:24:28Z","timestamp":1730265868354,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/iitsi.2010.164","type":"proceedings-article","created":{"date-parts":[[2010,4,28]],"date-time":"2010-04-28T19:53:49Z","timestamp":1272484429000},"page":"793-796","source":"Crossref","is-referenced-by-count":0,"title":["An Intelligent Security Defensive Software Scheme and Realization"],"prefix":"10.1109","author":[{"given":"Kun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jin-dong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liu-qing","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhen-hua","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"158","article-title":"an adaptive intrusion detection system model","volume":"5","author":"he","year":"2007","journal-title":"Computer Engineering"},{"key":"ref3","first-page":"901","article-title":"A network architecture software based on system structure from the self-adaptation method","volume":"38","author":"mei","year":"2008"},{"key":"ref6","first-page":"456","article-title":"Research on Network Security Situation Awareness Model","volume":"43","author":"jibao","year":"2006","journal-title":"Journal of Computer research and development"},{"key":"ref5","first-page":"126","article-title":"A Policy-based Intrusion Prevention System","volume":"3","author":"mao","year":"2006","journal-title":"Journal of Applied Computing Research"},{"key":"ref8","first-page":"155","article-title":"Study and implementation of integrated network security monitoring system","volume":"24","author":"hui-min","year":"2003","journal-title":"Journal of China Institute of Communications"},{"key":"ref7","first-page":"351","article-title":"Study of Distributed Firewall Base Security System","volume":"34","author":"zhe","year":"2005","journal-title":"Jourmal of UEST of China"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2009.125"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2006.20"}],"event":{"name":"2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI)","start":{"date-parts":[[2010,4,2]]},"location":"Jian, China","end":{"date-parts":[[2010,4,4]]}},"container-title":["2010 Third International Symposium on Intelligent Information Technology and Security Informatics"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/5453385\/5453559\/05453741.pdf?arnumber=5453741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:33:32Z","timestamp":1489887212000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/5453741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":8,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/iitsi.2010.164","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}