{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:35Z","timestamp":1725574055224},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408031"},{"type":"electronic","value":"9783540452249"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45224-9_165","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T05:09:45Z","timestamp":1294376985000},"page":"1222-1229","source":"Crossref","is-referenced-by-count":0,"title":["SOID: An Ontology for Agent-Aided Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Francisco J.","family":"Martin","sequence":"first","affiliation":[]},{"given":"Enric","family":"Plaza","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"165_CR1","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co, Fort Whanington, PA, USA (1980)"},{"key":"165_CR2","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3, 186\u2013205 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"165_CR3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.484228","volume":"10","author":"M.G.B. White","year":"1996","unstructured":"White, M.G.B., Fisch, E.A., Pooch, U.W.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10, 20\u201323 (1996)","journal-title":"IEEE Network"},{"key":"165_CR4","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/S1389-1286(00)00136-5","volume":"34","author":"E.H. Spafford","year":"2000","unstructured":"Spafford, E.H., Zamboni, D.: Intrusion detection using autonomous agents. Computer Networks\u00a034, 547\u2013570 (2000)","journal-title":"Computer Networks"},{"key":"165_CR5","unstructured":"Carver, C.A., Hill, J.M., Surdu, J.R., Pooch, U.W.: A methodology for using intelligent agents to provide automated intrusion response. In: Proc. of the IEEE Workshop on Information Assurance and Security, West Point, NY, pp. 110\u2013116 (2000)"},{"key":"165_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-540-48061-7_65","volume-title":"New Directions in Rough Sets, Data Mining, and Granular-Soft Computing","author":"V.I. Gorodetski","year":"1999","unstructured":"Gorodetski, V.I., Popyack, L.J., Kotenko, I.V., Skormin, V.A.: Ontology-based multi-agent model of information security system. In: Zhong, N., Skowron, A., Ohsuga, S. (eds.) RSFDGrC 1999. LNCS (LNAI), vol.\u00a01711, pp. 528\u2013532. Springer, Heidelberg (1999)"},{"issue":"4","key":"165_CR7","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1093\/bib\/1.4.398","volume":"1","author":"R. Stevens","year":"2000","unstructured":"Stevens, R., Bechhofer, S., Goble, C.: Ontology-based Knowledge Representation for Bioinformatics. Briefings in Bioinformatics\u00a01 (2000)","journal-title":"Briefings in Bioinformatics"},{"key":"165_CR8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/0167-739X(96)00003-9","volume":"12","author":"J. Arcos","year":"1996","unstructured":"Arcos, J., Plaza, E.: Inference and reflection in the object-centered representation language Noos. Journal of Future Generation Computer Systems 12, 173\u2013188 (1996)","journal-title":"Journal of Future Generation Computer Systems"},{"key":"165_CR9","doi-asserted-by":"crossref","unstructured":"Goldman, R.P., Heimerdinger, W., Harp, S.A., Geib, C.W., Thomas, V., Carter, R.L.: Information modeling for intrusion report aggregation. In: DICEX (2001)","DOI":"10.1109\/DISCEX.2001.932228"},{"key":"165_CR10","unstructured":"Howard, J.D., Longstaff, T.A.: A common language for computer security incidents. Technical Report SAND98-8667, Sandia National Laboratories (1998)"},{"key":"165_CR11","unstructured":"Martin, F.J., Plaza, E.: Case-based sequence analysis for intrusion detection (2003) (Submitted)"},{"key":"165_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-36084-0_7","volume-title":"Recent Advances in Intrusion Detection","author":"B. Morin","year":"2002","unstructured":"Morin, B., M\u00e9, L., Debar, H., Ducass\u00e9, M.: M2d2: A formal data model for ids alert correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 115\u2013137. Springer, Heidelberg (2002)"},{"key":"165_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/3-540-36084-0_6","volume-title":"Recent Advances in Intrusion Detection","author":"P.A. Porras","year":"2002","unstructured":"Porras, P.A., Fong, M.W., Valdes, A.: A mission-impact-based approach to INFOSEC alarm correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 95\u2013114. Springer, Heidelberg (2002)"},{"key":"165_CR14","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1145\/503339.503342","volume":"4","author":"P. Ning","year":"2001","unstructured":"Ning, P., Jajodia, S., Wang, X.S.: Abstraction-based intrusion detection in distributed environments. ACM Transactions on Information and System Security\u00a04, 407\u2013452 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"165_CR15","doi-asserted-by":"crossref","unstructured":"Undercoffer, J., Pinkston, J.: Modeling computer attacks: A target-centric ontology for intrusion detection. In: CADIP Research Symposium (2002)","DOI":"10.1007\/978-3-540-45248-5_7"},{"key":"165_CR16","first-page":"53","volume-title":"Proc. Workshop on New Security Paradigms","author":"V. Raskin","year":"2001","unstructured":"Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S.: Ontology in information security: a useful theoretical foundation and methodological tool. In: Proc. Workshop on New Security Paradigms, pp. 53\u201359. ACM Press, New York (2001)"},{"key":"165_CR17","unstructured":"Noel, S.: Development of a cyber-defense ontology. Center for Secure Information Systems George Mason University, Fairfax, Virginia (2001)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45224-9_165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:25:16Z","timestamp":1559913916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45224-9_165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408031","9783540452249"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45224-9_165","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}