{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:16Z","timestamp":1725567376731},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666455"},{"type":"electronic","value":"9783540480617"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-48061-7_65","type":"book-chapter","created":{"date-parts":[[2010,10,14]],"date-time":"2010-10-14T06:52:21Z","timestamp":1287039141000},"page":"528-532","source":"Crossref","is-referenced-by-count":5,"title":["Ontology-Based Multi-agent Model of an Information Security System"],"prefix":"10.1007","author":[{"given":"V. I.","family":"Gorodetski","sequence":"first","affiliation":[]},{"given":"L. J.","family":"Popyack","sequence":"additional","affiliation":[]},{"given":"I. V.","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"V. A.","family":"Skormin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Applications Conference. Phoenix, Arizona, December 7-11 (1998)","DOI":"10.1109\/CSAC.1998.738563"},{"issue":"10","key":"65_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyer, S.A., Somayaji, A.: Computer Immunology. Communication of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communication of the ACM"},{"key":"65_CR3","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. In: Proceedings of International Workshop on Formal Ontology (March 1993)"},{"issue":"3","key":"65_CR4","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0167-4048(93)90110-Q","volume":"12","author":"Hochberg","year":"1993","unstructured":"Hochberg, et al.: \u201cNADIR\u201d: An Automated System for Detecting Network Intrusion and Misuse. Computers and Security\u00a012(3), 235\u2013248 (1993)","journal-title":"Computers and Security"},{"key":"65_CR5","doi-asserted-by":"crossref","unstructured":"Lunt, T., et al.: Knowledge-based Intrusion Detection. In: Proceedings of 1989 Governmental Conference Artificial Intelligence Systems (March 1989)","DOI":"10.1109\/AISIG.1989.47311"},{"key":"65_CR6","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to autonomous live disturbance. In: Proceedings of 20-th National Information System Security Conference. National Institute of Standards and Technologies (1997)"},{"key":"65_CR7","unstructured":"Stainford-Chen, S., et al.: GrIDS: A Graph-based Intrusion Detection System for Large Networks. In: Proceedings of the 19\n                    th\n                   National Information System Security Conference, October 1996, vol.\u00a01, pp. 361\u2013370. National Institute of Standards and Technology (1996)"},{"key":"65_CR8","unstructured":"Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, pp. 74\u201381 (1997)"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"White, G., Fish, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network, 20\u201323 (January\/February 1996)","DOI":"10.1109\/65.484228"}],"container-title":["Lecture Notes in Computer Science","New Directions in Rough Sets, Data Mining, and Granular-Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-48061-7_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T16:26:34Z","timestamp":1553185594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-48061-7_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666455","9783540480617"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-48061-7_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}