{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:53:29Z","timestamp":1725490409979},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_12","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"122-130","source":"Crossref","is-referenced-by-count":2,"title":["Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model"],"prefix":"10.1007","author":[{"given":"Do-hyeon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Doo-young","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jae-il","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"The First IEEE and IFIP International Conference","author":"K. Mohammadi","year":"2005","unstructured":"Mohammadi, K., Hamidi, H.: Evaluation of fault-tolerant mobile agents in distributed systems. In: The First IEEE and IFIP International Conference. IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"7","key":"12_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/35.689634","volume":"36","author":"M.S. Greenberg","year":"1998","unstructured":"Greenberg, M.S., Byington, L.C., Harper, D.G.: Mobile agents and security. Communications Magazine, IEEE\u00a036(7), 76\u201385 (1998)","journal-title":"Communications Magazine, IEEE"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/SSST.2004.1295712","volume-title":"Proceedings of the Thirty-Sixth Southeastern Symposium","author":"S.Y. Foo","year":"2004","unstructured":"Foo, S.Y., Arradondo, M.: Mobile agents for computer intrusion detection. In: Proceedings of the Thirty-Sixth Southeastern Symposium, pp. 517\u2013521. IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/B:JONS.0000015700.02134.1c","volume":"12","author":"D. Marks","year":"2004","unstructured":"Marks, D., Mell, P., Stinson, M.: Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. Journal of Network and Systems Management\u00a012(1), 95\u2013110 (2004)","journal-title":"Journal of Network and Systems Management"},{"key":"12_CR5","unstructured":"Jansen, W.: Intrusion Detection with Mobile Agents.\u00a0National institute of Standards and Technology"},{"key":"12_CR6","unstructured":"Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response.\u00a0National Institute of Standards and Technology Computer Security Division"},{"key":"12_CR7","unstructured":"Balasubramaniyan, J.: An Architecture for Intrusion Detection using Autonomous Agents. Perdue University"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Rabiner, L.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In: Proceedings of the IEEE, vol. 77(2), pp. 257\u2013286 (1989)","DOI":"10.1109\/5.18626"},{"key":"12_CR9","first-page":"893","volume-title":"CCECE 2003 - CCGEI 2003","author":"F. Gao","year":"2003","unstructured":"Gao, F., Sun, J., Wei, Z.: The Prediction Role of Hidden Markov Model in Intrusion Detection. In: CCECE 2003 - CCGEI 2003, Montr\u00e9al, pp. 893\u2013896. IEEE, Los Alamitos (2003)"},{"key":"12_CR10","volume-title":"SIGSAC Reviews.","author":"M. Wright","year":"1990","unstructured":"Wright, M.: Communication Security in a Distributed Network. In: SIGSAC Reviews. ACM Press, New York (1990)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Pashalidis, A., Fleury, M.: Secure Network Management Within an Open-Source Mobile Agent Framework. Journal of Network and Systems Management\u00a012(1) (2004)","DOI":"10.1023\/B:JONS.0000015696.23905.66"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:32:05Z","timestamp":1619519525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_12","relation":{},"subject":[]}}