{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:44:05Z","timestamp":1773654245523,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540343837","type":"print"},{"value":"9783540343844","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11758532_31","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T18:53:17Z","timestamp":1147200797000},"page":"224-231","source":"Crossref","is-referenced-by-count":26,"title":["Agent-Based Approach for Distributed Intrusion Detection System Design"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Juszczyszyn","sequence":"first","affiliation":[]},{"given":"Ngoc Thanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Grzegorz","family":"Kolaczek","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Grzech","sequence":"additional","affiliation":[]},{"given":"Agnieszka","family":"Pieczynska","sequence":"additional","affiliation":[]},{"given":"Rados\u0142aw","family":"Katarzyniak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Allmanz, M., et al.: A First Look at Modern Enterprise Traffic. In: Proc. Internet Measurement Conference, October 2005, pp. 217\u2013231 (2005)"},{"issue":"4","key":"31_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"O. Boykin","year":"2005","unstructured":"Boykin, O., Roychowdhury, V.: Personal Email Networks: An Effective Anti-Spam Tool. IEEE Computer\u00a038(4), 61\u201368 (2005)","journal-title":"IEEE Computer"},{"key":"31_CR3","first-page":"121","volume":"66","author":"H. Ebel","year":"2002","unstructured":"Ebel, H., Mielsh, L., Bornholdt, S.: Scale-free topology of e-mail networks. Physical Review E\u00a066, 121\u2013131 (2002)","journal-title":"Physical Review E"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the Internet topology. In: Proc. ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 1999, pp. 251\u2013262 (1999)","DOI":"10.1145\/316188.316229"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Kohler, E., Liy, J., Paxson, V., Shenker, S.: Observed Structure of Addresses in IP Traffic. In: Proc. SIGCOMM Internet Measurement Workshop, November 2002, pp. 253\u2013266 (2002)","DOI":"10.1145\/637201.637242"},{"key":"31_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/11552451_69","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"G. Kolaczek","year":"2005","unstructured":"Kolaczek, G., Kuchtiak-Pieczynska, A., Juszczyszyn, K., Grzech, A., Katarzynak, R., Nguyen, N.T.: A Mobile Agent Approach to Intrusion Detection in Network Systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03682, pp. 514\u2013519. Springer, Heidelberg (2005)"},{"issue":"1-4","key":"31_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/S0020-0255(02)00260-8","volume":"147","author":"N.T. Nguyen","year":"2002","unstructured":"Nguyen, N.T.: Consensus systems for conflict solving in distributed systems. Information Sciences\u00a0147(1-4), 91\u2013122 (2002)","journal-title":"Information Sciences"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Nicol, D., Liljenstam, M., Liu, J.: Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure. In: Proc. Performance Tools Conference, pp. 1\u201310 (2003)","DOI":"10.1007\/978-3-540-45232-4_1"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/BF01158964","volume":"16","author":"I. Norros","year":"1994","unstructured":"Norros, I.: A storage model with self-similar input. Queueing Syst.\u00a016, 387\u2013396 (1994)","journal-title":"Queueing Syst."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. In: Proc. of ACM SIGCOMM 2004, Portland, pp. 219\u2013230 (2004)","DOI":"10.1145\/1015467.1015492"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11758532_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T22:56:45Z","timestamp":1552517805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11758532_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540343837","9783540343844"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11758532_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}