{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:08:36Z","timestamp":1725487716988},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401971"},{"type":"electronic","value":"9783540448648"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44864-0_83","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:09:48Z","timestamp":1184598588000},"page":"809-818","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and Simulation of Distributed Security Models"],"prefix":"10.1007","author":[{"given":"Hee Suk","family":"Seo","sequence":"first","affiliation":[]},{"given":"Tae Ho","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Sung Do","family":"Chi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"83_CR1","unstructured":"S Mclure, J. Scambray and G. Kurtz, \u201cHacking Exposed: Network Security Secrets and Solutions,\u201d McGraw-Hill, 1999."},{"key":"83_CR2","volume-title":"Object-Oriented Simulation with Hierarchical, Modular Models","author":"B. P. Zeigler","year":"1990","unstructured":"B. P. Zeigler, \u201cObject-Oriented Simulation with Hierarchical, Modular Models,\u201d San Diego, CA, USA: Academic Press, 1990."},{"key":"83_CR3","unstructured":"S. Northcutt, \u201cNetwork Intrusion Detection \u2014 An Analyst\u2019s Handbook,\u201d New Riders Publishing, 1999."},{"issue":"2","key":"83_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1142\/S0218001493000133","volume":"7","author":"K. Decker","year":"1993","unstructured":"K. Decker, A. Garvey, M. Humphrey and V. R. Lesser, \u201cControl Heuristics for Scheduling in a Parallel Blackboard System,\u201d International Journal of pattern Recognition and Artificial Intelligence, Vol. 7, No. 2, pp. 243\u2013264, 1993.","journal-title":"International Journal of pattern Recognition and Artificial Intelligence"},{"key":"83_CR5","unstructured":"E. D. Zwicky, \u201cBuilding Internet Firewalls,\u201d 2nd Ed., O\u2019Relly & Associates, 2000."},{"key":"83_CR6","unstructured":"Dieter Gollmann, \u201cComputer Security,\u201d Wiley, 1999."},{"key":"83_CR7","series-title":"Technical Report","volume-title":"Integrity consideration for secure computer systems","author":"K. J. Biba","year":"1977","unstructured":"K. J. Biba. \u201cIntegrity consideration for secure computer systems,\u201d Technical Report ESDTR-76-372, MTR-3153, The MITRE Corporation, Bedford, MA, Apr. 1977."},{"key":"83_CR8","unstructured":"J. Forristal and G. Shipley, \u201cVulnerability Assessment Scanners,\u201d Network Computing, 8 Jan. 2001."},{"key":"83_CR9","unstructured":"J. Barrus and N. C. Rowe, \u201cA Distributed Autonomous-Agent Network-Intrusion Detection and Response System,\u201d Proceedings of Command and Control Research and Technology Symposium, Monterey CA, pp. 577\u2013586, Jun. 1998."},{"key":"83_CR10","doi-asserted-by":"crossref","unstructured":"H.S. Seo and T.H. Cho, \u201cModeling and Simulation for Detecting a Distributed Denial of Service Attack,\u201d Lecture Notes in Artificial Intelligence, Springer Verlag, Dec. 2002.","DOI":"10.1007\/3-540-36187-1_16"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2014 ICCS 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44864-0_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:33:36Z","timestamp":1556670816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44864-0_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401971","9783540448648"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-44864-0_83","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}