{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:41:22Z","timestamp":1765356082135},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319422909"},{"type":"electronic","value":"9783319422916"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42291-6_79","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T15:10:22Z","timestamp":1468249822000},"page":"796-807","source":"Crossref","is-referenced-by-count":1,"title":["Multi-agent Systems for Dynamic Forensic Investigation"],"prefix":"10.1007","author":[{"given":"Phillip","family":"Kendrick","sequence":"first","affiliation":[]},{"given":"Abir Jaafar","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Criado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"issue":"3","key":"79_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26\u201341 (1994)","journal-title":"IEEE Netw."},{"issue":"15","key":"79_CR2","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Comput. Commun. 25(15), 1356\u20131365 (2002)","journal-title":"Comput. Commun."},{"issue":"3","key":"79_CR3","first-page":"1","volume":"1","author":"MR Clint","year":"2002","unstructured":"Clint, M.R., Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1\u201312 (2002)","journal-title":"Int. J. Digit. Evid."},{"key":"79_CR4","volume-title":"An introduction to multiagent systems","author":"M Woolridge","year":"2011","unstructured":"Woolridge, M.: An introduction to multiagent systems, 2nd edn. Wiley, Hoboken (2011)","edition":"2"},{"issue":"1","key":"79_CR5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2012","unstructured":"Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"79_CR6","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MIC.2002.1067738","volume":"6","author":"V Corey","year":"2002","unstructured":"Corey, V., Peterman, C., Shearin, S., Greenberg, M.S., Van Bokkelen, J.: Network forensics analysis. IEEE Internet Comput. 6(6), 60\u201366 (2002)","journal-title":"IEEE Internet Comput."},{"key":"79_CR7","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-319-14039-1_8","volume-title":"Cyber Warfare","author":"P Shakarian","year":"2015","unstructured":"Shakarian, P., Simari, G.I., Moores, G., Parsons, S.: Cyber attribution: an argumentation-based approach. In: Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V., Wang, C. (eds.) Cyber Warfare, pp. 151\u2013171. Springer, Berlin (2015)"},{"key":"79_CR8","unstructured":"Shakarian, P., Simari, G.I., Moores, G., Parsons, S., Falappa, M.A.: An argumentation-based framework to address the attribution problem in cyber-warfare. CoRR, abs\/1404.6699 (2014)"},{"key":"79_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/978-3-319-04939-7_16","volume-title":"Foundations of Information and Knowledge Systems","author":"P Shakarian","year":"2014","unstructured":"Shakarian, P., Simari, G.I., Falappa, M.A.: Belief revision in structured probabilistic argumentation. In: Beierle, C., Meghini, C. (eds.) FoIKS 2014. LNCS, vol. 8367, pp. 324\u2013343. Springer, Heidelberg (2014)"},{"key":"79_CR10","doi-asserted-by":"crossref","unstructured":"Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: Proceedings of - 2011 8th International Conference on Information Technol. New Generations, ITNG 2011, pp. 918\u2013926 (2010)","DOI":"10.1109\/ITNG.2011.159"},{"issue":"5","key":"79_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14257\/ijdta.2013.6.5.01","volume":"6","author":"A Jahanbin","year":"2013","unstructured":"Jahanbin, A., Ghafarian, A., Seno, S.A.H., Nikookar, S.: A computer forensics approach based on autonomous intelligent multi-agent system. Int. J. Database Theory Appl. 6(5), 1\u201312 (2013)","journal-title":"Int. J. Database Theory Appl."},{"issue":"3","key":"79_CR12","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1016\/j.jnca.2012.01.006","volume":"35","author":"ZA Baig","year":"2012","unstructured":"Baig, Z.A.: Multi-agent systems for protecting critical infrastructures: a survey. J. Netw. Comput. Appl. 35(3), 1151\u20131161 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"79_CR13","unstructured":"Mees, W.: Multi-agent anomaly-based APT detection. In: Proceedings of Information Systems Technology Panel Symposium, pp. 1\u201310 (2012)"},{"key":"79_CR14","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.engappai.2014.06.022","volume":"35","author":"NA Seresht","year":"2014","unstructured":"Seresht, N.A., Azmi, R.: MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng. Appl. Artif. Intell. 35, 286\u2013298 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"Alkhateeb, F., Al Maghayreh, E., Aljawarneh, S.: A multi agent-based system for securing university campus: Design and architecture. In: 2010 International Conference on Intelligent Systems, Modelling and Simulation, pp. 75\u201379. IEEE, January 2010","DOI":"10.1109\/ISMS.2010.25"},{"issue":"1","key":"79_CR16","first-page":"1","volume":"2","author":"A Orfila","year":"2005","unstructured":"Orfila, A., Carbo, J., Ribagorda, A.: Intrusion detection effectiveness improvement by a multi-agent system. Int. J. Comput. Sci. Appl. 2(1), 1\u20136 (2005)","journal-title":"Int. J. Comput. Sci. Appl."},{"issue":"2","key":"79_CR17","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0164-1212(02)00092-4","volume":"67","author":"G Helmer","year":"2003","unstructured":"Helmer, G., Wong, J.S.K., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. J. Syst. Softw. 67(2), 109\u2013122 (2003)","journal-title":"J. Syst. Softw."},{"key":"79_CR18","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Englewood Cliffs, 25, 27 (1995)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42291-6_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T00:34:39Z","timestamp":1568162079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42291-6_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319422909","9783319422916"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42291-6_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}