{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:59:58Z","timestamp":1769284798788,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540421030","type":"print"},{"value":"9783540451167","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45116-1_7","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T13:22:00Z","timestamp":1186406520000},"page":"39-50","source":"Crossref","is-referenced-by-count":18,"title":["Agent-Based Model of Computer Network Security System: A Case Study"],"prefix":"10.1007","author":[{"given":"Vladimir I.","family":"Gorodetski","sequence":"first","affiliation":[]},{"given":"O.","family":"Karsayev","sequence":"additional","affiliation":[]},{"given":"A.","family":"Khabalov","sequence":"additional","affiliation":[]},{"given":"I.","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"Leonard J.","family":"Popyack","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Skormin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,8]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner E.: State of the Practice of Intrusion Detection Technologies. In: Technical Report CMU\/SEI-99-TR-028. Carnegie Mellon Software Engineering Institute (2000)","DOI":"10.21236\/ADA375846"},{"key":"7_CR2","unstructured":"Asaka, M., Okazawa, S., Taguchi, A., Goto S.: A Method of Tracing Intruders by Use of Mobile Agents. In: Proceedings of INET\u201999 (1999)"},{"key":"7_CR3","unstructured":"Bace R.: Intrusion Detection. Indianapolis, Macmillan Computer Publishing (1999)"},{"key":"7_CR4","unstructured":"Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni D.: An Architecture for Intrusion Detection Using Autonomous Agents. Coast TR 98-05. West Lafayette, COAST Laboratory, Purdue University (1998)"},{"key":"7_CR5","unstructured":"Bonif\u00e1cioJr., Cansian, A., Moreira E., and de Carvalho A.: An Adaptive Intrusion Detection System Using Neural Networks. Proceedings of the IFIP World Computer Congress-Security in Information Systems, IFIP-SEC\u201998, Chapman & Hall, Vienna, Austria (1998)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Conner, M., Patel, C., Little M.: Genetic Algorithm\/Artificial Life Evolution of Security Vulnerability Agents. In: Proceedings of 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program (ATIRP). Army Research Laboratory, Federal Laboratory (1999)","DOI":"10.1109\/MILCOM.1999.822782"},{"key":"7_CR7","unstructured":"Crosbie, M., Spafford G.: Applying Genetic Programming to Intrusion Detection. In: Proceedings of the AAAI Fall Symposium on Genetic Programming. Cambridge, Menlo Park, CA, AAAI Press (1995)"},{"key":"7_CR8","unstructured":"Dasgupta, D.: Immunity-Based Intrusion Detection System: A General Framework. In: Proceedings of the 22nd National Information Systems Security Conference, USA (1999)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Helmer, G., Wong, J., Honavar, V., Miller, L.: Intelligent Agents for Intrusion Detection. In: Proceedings of the 1998 IEEE Information Technology Conference, Environment for the Future, Syracuse, NY, IEEE (1998)","DOI":"10.1109\/IT.1998.713396"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Gorodetski, V., Kotenko, I., Skormin, V.: Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents\u2019 Community. In: Information Security for Global Information Infrastructures, IFIP TC11 Sixteenth Annual Working Conference on Information Security, Qing, S., Eloff J.H.P (eds), Beijing, China (2000)","DOI":"10.1007\/978-0-387-35515-3_30"},{"key":"7_CR11","unstructured":"Jacobs, S., Dumas, D., Booth, W., Little, M.: Security Architecture for Intelligent Agent Based Vulnerability Analysis. In: Proceedings of 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program (ATIRP) Army Research Laboratory, Federal Laboratory (1999)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Jansen, W., Mell, P., Karygiannis, T., Marks D.: Mobile Agents in Intrusion Detection and Response. In: Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada (2000)","DOI":"10.6028\/NIST.IR.6416"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Lange, D., Oshima, M.: A Security Model for Aglets. In: IEEE Internet Computing (1997)","DOI":"10.1109\/4236.612220"},{"key":"7_CR14","unstructured":"Lee, W., Stolfo, S.J., Mok, K.: A Data mining Framework for Building Intrusion Detection Model. In: Proceedings of the IEEE Symposium on Security and Privacy (1999)"},{"key":"7_CR15","unstructured":"Ptacek, T.H., Newsham, T.N.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Secure Networks, Inc. (1998)"},{"key":"7_CR16","unstructured":"Queiroz, J., Carmo, L., Pirmez, L.: MICAEL: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. In: Proceedings of Second International Workshop on the Recent Advances in Intrusion Detection, West Lafayette, USA. (1999)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a Computer Immune System. In: Proceedings of the 1997 New Security Paradigms Workshop (1998)","DOI":"10.1145\/283699.283742"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"White, G., Fisch, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. In: IEEE Network, Vol. 10(1) (1996)","DOI":"10.1109\/65.484228"}],"container-title":["Lecture Notes in Computer Science","Information Assurance in Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45116-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:44:07Z","timestamp":1556725447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45116-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421030","9783540451167"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45116-1_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}