{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:02Z","timestamp":1725551162396},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240761"},{"type":"electronic","value":"9783540305361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30536-1_28","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:31:39Z","timestamp":1270063899000},"page":"240-251","source":"Crossref","is-referenced-by-count":11,"title":["Agent-Based Distributed Intrusion Alert System"],"prefix":"10.1007","author":[{"given":"Arjita","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Sandip","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Cheng, J., Bell, D., Liu, W.: Learning bayesian networks from data: An efficient approach based on information theory. Technical report, University of Alberta, Canada (1998)"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/0004-3702(90)90060-D","volume":"42","author":"G.F. Cooper","year":"1990","unstructured":"Cooper, G.F.: The computational complexity of probabilistic inference using bayesian belief networks. Artificial Intelligence\u00a042, 393\u2013405 (1990)","journal-title":"Artificial Intelligence"},{"key":"28_CR3","unstructured":"Guo, H., Hsu, W.H.: A survey of algorithms for real-time bayesian network inference. In: AAAI\/KDD\/UAI-2002 Joint Workshop on Real-Time Decision Support and Diagnosis Systems, Edmonton (July 2002)"},{"key":"28_CR4","unstructured":"Huang, M.Y., Wicks, T.M.: A large-scale distributed intrusion detection framework based on attack strategy analysis. In: Web proceedings of the First International Workshop on Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium (September 1998)"},{"key":"28_CR5","volume-title":"An Introduction to Bayesian Networks","author":"F.V. Jensen","year":"1996","unstructured":"Jensen, F.V.: An Introduction to Bayesian Networks. Springer, New York (1996)"},{"key":"28_CR6","unstructured":"Kddcup 1999: Intrusion detection data set. DARPA Intrusion data repository (1999), URL: \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup.data_10_percent.gz"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Lauritzen, S.L., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their applications to expert systems. In: Proceedings of the Royal Statistical Society. Series B, vol.\u00a050, pp. 154\u2013227 (1988)","DOI":"10.1111\/j.2517-6161.1988.tb01721.x"},{"key":"28_CR8","unstructured":"Mit lincoln laboratory. DARPA Intrusion data repository, URL: \n                    \n                      http:\/\/www.ll.mit.edu\/IST\/ideval\/"},{"issue":"3","key":"28_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B. Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network intrusion detection. IEEE Network\u00a08(3), 26\u201341 (1994)","journal-title":"IEEE Network"},{"key":"28_CR10","unstructured":"Porras, P.A., Neumann, P.G.: Emerald: event monitoring enabling responses to anomalous live disturbances. In: 20th National Information Systems Security Conference (October 1997)"},{"key":"28_CR11","unstructured":"Brentano, J., Snapp, S., Dias, G., et al.: Dids (distributed intrusion detection system) motivation, architecture, and an early prototype. In: Fourteenth National Computer Security Conference, Washington, DC (October 1991)"},{"issue":"1","key":"28_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0167-9473(03)00177-4","volume":"45","author":"S.L. Scott","year":"2004","unstructured":"Scott, S.L.: A bayesian paradigm for designing intrusion detection system. Computational Statistics and Data Analysis\u00a045(1), 69\u201383 (2004)","journal-title":"Computational Statistics and Data Analysis"},{"issue":"4","key":"28_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/64.608189","volume":"12","author":"S. Sen","year":"1997","unstructured":"Sen, S.: Developing an automated distributed meeting scheduler. IEEE Expert\u00a012(4), 41\u201345 (1997)","journal-title":"IEEE Expert"},{"issue":"2","key":"28_CR14","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0004-3702(02)00289-8","volume":"142","author":"S. Sen","year":"2002","unstructured":"Sen, S.: Believing others: Pros and cons. Artificial Intelligence\u00a0142(2), 179\u2013203 (2002)","journal-title":"Artificial Intelligence"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/0004-3702(94)90072-8","volume":"68","author":"S. Shimony","year":"1994","unstructured":"Shimony, S.: Finding maps for belief networks is np-hard. Artificial Intelligence\u00a068, 399\u2013410 (1994)","journal-title":"Artificial Intelligence"},{"issue":"4","key":"28_CR16","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/S1389-1286(00)00136-5","volume":"34","author":"E.H. Spafford","year":"2000","unstructured":"Spafford, E.H., Zamboni, D.: Intrusion detection using autonomous agents. Computer Networks\u00a034(4), 547\u2013570 (2000)","journal-title":"Computer Networks"},{"issue":"1","key":"28_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/65.484228","volume":"10","author":"G. White","year":"1996","unstructured":"White, G., Fisch, E., Pooch, U.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network\u00a010(1), 20\u201323 (1996)","journal-title":"IEEE Network"},{"issue":"3","key":"28_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/S0888-613X(03)00017-3","volume":"33","author":"Y. Xiang","year":"2003","unstructured":"Xiang, Y.: Comparison of multiagent inference methods in multiply sectioned bayesian networks. International Journal of Approximate Reasoning\u00a033(3), 235\u2013254 (2003)","journal-title":"International Journal of Approximate Reasoning"},{"issue":"2","key":"28_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1111\/j.1467-8640.1993.tb00306.x","volume":"9","author":"Y. Xiang","year":"1993","unstructured":"Xiang, Y., Poole, D., Beddoes, M.: Multiply sectioned bayesian networks and junction forests for large knowledge-based systems. Computational Intelligence\u00a09(2), 171\u2013220 (1993)","journal-title":"Computational Intelligence"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing - IWDC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30536-1_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:26:14Z","timestamp":1619997974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30536-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240761","9783540305361"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30536-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}