{"id":"https://openalex.org/W2054533361","doi":"https://doi.org/10.1109/hicss.2004.1265449","title":"Internet security: intrusion detection &amp;amp; prevention","display_name":"Internet security: intrusion detection &amp;amp; prevention","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2054533361","doi":"https://doi.org/10.1109/hicss.2004.1265449","mag":"2054533361"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2004.1265449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110450972","display_name":"J.G. Tront","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"J.G. Tront","raw_affiliation_strings":["Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","Electr. & Comput. Eng. Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Electr. & Comput. Eng. Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051333920","display_name":"Randy Marchany","orcid":"https://orcid.org/0000-0002-9048-3872"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.C. Marchany","raw_affiliation_strings":["Computing Center, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Computing Center, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110450972"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.16245148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1 pp.","last_page":"1 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9020000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7627571225166321},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7246636748313904},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5726877450942993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5474309921264648},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5083853602409363},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4719005525112152},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.46795380115509033},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20220845937728882}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7627571225166321},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7246636748313904},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5726877450942993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5474309921264648},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5083853602409363},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4719005525112152},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.46795380115509033},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20220845937728882},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hicss.2004.1265449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4230197055","https://openalex.org/W4296749040","https://openalex.org/W621808327","https://openalex.org/W644007644","https://openalex.org/W2497198634","https://openalex.org/W3012257603","https://openalex.org/W1586784764","https://openalex.org/W4292264782","https://openalex.org/W1559289099","https://openalex.org/W3016450995"],"abstract_inverted_index":{"Daily":[0],"commerce":[1],"on":[2,79,118,182,187],"the":[3,14,18,28,36,59,71,76,95,98,113,119,130,150,155,161,166,188,196,208],"Internet":[4,15,60,99,120],"consists":[5],"of":[6,8,11,30,82,97,106,115,157,163,170,190,239],"billions":[7],"dollars":[9],"worth":[10],"transactions.":[12],"Unfortunately,":[13],"has":[16],"become":[17,42],"lurking":[19],"grounds":[20],"for":[21,67,198,203],"electronic":[22,54],"n'er-do-wells":[23],"who":[24,243],"are":[25,174,211],"constantly":[26,123],"jeopardizing":[27],"processes":[29],"business.":[31,108],"Recent":[32],"network":[33,116,171,226],"events":[34,164],"throughout":[35],"world":[37],"have":[38,177],"caused":[39],"people":[40],"to":[41,47,61,73,93,103,176,213,217,223,234],"more":[43,45],"and":[44,89,100,125,165,201],"hesitant":[46],"transact":[48],"business":[49],"over":[50],"broadly":[51],"connected":[52],"networked":[53],"media.":[55],"Will":[56],"this":[57,111,231],"cause":[58],"be":[62,122,136],"abandoned":[63],"as":[64],"a":[65,83,236],"vehicle":[66],"transacting":[68],"business?":[69],"Without":[70],"ability":[72],"trust":[74],"in":[75,146,207,230],"scrupulous":[77],"behavior":[78],"both":[80],"ends":[81],"transaction,":[84],"most":[85],"prudent":[86],"e-commerce":[87,152],"operators":[88],"clients":[90],"may":[91],"decide":[92],"forgo":[94],"use":[96,156],"revert":[101],"back":[102],"old":[104],"methods":[105],"doing":[107],"To":[109],"counter":[110],"trend,":[112],"issues":[114],"security":[117,133,172,191],"must":[121,135],"reviewed":[124],"appropriate":[126],"countermeasures":[127],"devised.":[128],"At":[129],"same":[131],"time,":[132],"measures":[134],"appropriately":[137],"devised":[138],"so":[139],"that":[140,193,221],"they":[141],"do":[142],"not":[143],"inhibit":[144],"or":[145],"any":[147],"way":[148],"dissuade":[149],"intended":[151],"operation.":[153],"As":[154],"wireless":[158],"technology":[159],"grows,":[160],"number":[162],"far":[167],"reaching":[168],"effects":[169],"problems":[173,192,206],"likely":[175],"an":[178],"even":[179],"larger":[180],"impact":[181],"e-commerce.":[183],"This":[184],"session":[185],"focuses":[186],"types":[189],"can":[194],"occur,":[195],"solutions":[197],"known":[199],"problems,":[200],"strategies":[202,220],"circumventing":[204],"these":[205],"future.":[209],"Attendees":[210],"challenged":[212],"interact":[214],"with":[215],"presenters":[216],"seek":[218],"out":[219],"apply":[222],"their":[224],"own":[225],"environments.":[227],"Discussions":[228],"initiated":[229],"venue":[232],"promise":[233],"produce":[235],"continuing":[237],"channel":[238],"communication":[240],"between":[241],"those":[242],"participate.":[244]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
