{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:10:02Z","timestamp":1736637002914,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494621"},{"type":"electronic","value":"9783540494638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935070_23","type":"book-chapter","created":{"date-parts":[[2006,11,13]],"date-time":"2006-11-13T07:25:27Z","timestamp":1163402727000},"page":"329-341","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-agent Cooperative Model and System for Integrated Security Monitoring"],"prefix":"10.1007","author":[{"given":"Xianxian","family":"Li","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. Technical Report CMU\/SEI-99-TR-028, Carnegie Mellon University, Software Engineering Institute (2000)","DOI":"10.21236\/ADA375846"},{"issue":"8","key":"23_CR2","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H. Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Nertworks\u00a031(8), 805\u2013822 (1999)","journal-title":"Computer Nertworks"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319710"},{"key":"23_CR4","unstructured":"Check Point. Build Your Security Infrastructure With Best-of-Breed Products From OPSEC. Check Point Software Technologies Ltd. (2004)"},{"key":"23_CR5","unstructured":"Symantec. Symantec Enterprise Security Architecture (SESA TM ). Symantec Enterprise Security (2002)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a Distributed Firewall. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 190\u2013199 (2000)","DOI":"10.1145\/352600.353052"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Discovery of policy anomalies in distributed firewalls. In: Proceedings of twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2004, vol.\u00a04, pp. 2655\u20132616 (2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"23_CR8","unstructured":"Yue, D., Hui-qiang, W., Yong-gang, P.: Design of A Distributed Intrusion Detection System Based on Independent Agents. In: Proceedings of International Conference on Intelligent Sensing and Information Processing, pp. 254\u2013257 (2004)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Adaptive Agents and Multi-Agent Systems II","author":"N. Foukia","year":"2005","unstructured":"Foukia, N.: IDReAM: Intrusion Detection and Response Executed with Agent Mobility. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS, vol.\u00a03394, Springer, Heidelberg (2005)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Zaki, M., Sobh, T.S.: A cooperative agent-based model for active security systems. Journal of Network and Computer Applications (November 2004)","DOI":"10.1016\/j.jnca.2004.02.002"},{"key":"23_CR11","unstructured":"Santana Torrellas, G.A., Villa Vargas, L.A.: Modelling a flexible network security systems using multi-agents systems: security assessment considerations. In: Proceedings of the 1st international symposium on Information and communication technologies (September 2003)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Gangadharan, M., Hwang, K.: Intranet Security with Micro-Firewalls and Mobile Agents for Proactive Intrusion Response. In: The 2001 IEEE International conference on Computer Networks and Mobile Computing (October 2001)","DOI":"10.1109\/ICCNMC.2001.962615"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Fu, Z., Huang, H., Wu, T., Wu, S.F., Gong, F., Xu, C., Baldine, I.: ISCP: Design and Implementation of An Inter-Domain Security Management Agent (SMA) Coordination Protocol. In: Proceedings of the 2000 IEEE\/IFIP Network Operations and Management Symposium, pp. 565\u2013578 (2000)","DOI":"10.1109\/NOMS.2000.830414"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Boudaoud, K., McCathieNevile, C.: An Intelligent Agent-based Model for Security Management. In: Proceedings of the Seventh International Symposium on Computers and Communications, pp. 877\u2013882 (2002)","DOI":"10.1109\/ISCC.2002.1021776"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Boudaoud, K., Lubiod, H., Boutaba, R., Guessoum, Z.: Network Security Management with Intelligent Agents. In: Proceedings of the 2000 IEEE\/IFIP Network Operations and Management Symposium, pp. 579\u2013592 (April 2000)","DOI":"10.1109\/NOMS.2000.830415"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"David, S., Christophe, L., Noureddine, Z.: Distributed Cooperation Modeling for Maintenance Using Petri Nets and Multi-Agents Systems. In: Proceedings of 2003 IEEE International Symposium on Computational Intelligence in Robotics and Automation, vol.\u00a01, pp. 366\u2013371 (July 2003)","DOI":"10.1109\/CIRA.2003.1222117"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Petrov, P.V., Hicks, J.D., Stoycn, A.D.: The Topologies of Cooperation in Knowledge Intensive Multi-Agent System. In: Proceedings of 2003 International Conference on Integration of Knowledge Intensive Multi-Agent Systems, pp. 741\u2013746 (October 2003)","DOI":"10.1109\/KIMAS.2003.1245130"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Gorodetski, V., Kotenko, I.: The Multi-agent Systems for Computer Network Security Assurance: Frameworks and Case Studies. In: Proceedings of the 2002 IEEE International Conference on Artificial Intelligence Systems (September 2002)","DOI":"10.1109\/ICAIS.2002.1048117"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935070_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T22:52:13Z","timestamp":1736635933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935070_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494621","9783540494638"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11935070_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}