{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:17Z","timestamp":1725490217614},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744788"},{"type":"electronic","value":"9783540744818"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74481-8_16","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T01:57:22Z","timestamp":1187834242000},"page":"161-172","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Intrusions in Agent System by Means of Exception Handling"],"prefix":"10.1007","author":[{"given":"Eric","family":"Platon","sequence":"first","affiliation":[]},{"given":"Martin","family":"Reh\u00e1k","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Sabouret","sequence":"additional","affiliation":[]},{"given":"Michal","family":"P\u011bchou\u010dek","sequence":"additional","affiliation":[]},{"given":"Shinichi","family":"Honiden","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.3233\/MGS-2005-1202","volume":"1","author":"D. \u0160i\u0161l\u00e1k","year":"2005","unstructured":"\u0160i\u0161l\u00e1k, D., P\u011bchou\u010dek, M., Reh\u00e1k, M., To\u017ei\u010dka, J., Benda, P.: Solving inaccessibility in multi-agent systems by mobile middle-agents. Multiagent and Grid Systems 1, 73\u201387 (2005)","journal-title":"Multiagent and Grid Systems"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Platon, E.: Model of Exception Management in Multi-Agent Systems. PhD thesis, National Institute of Informatics, Sokendai, Tokyo, Japan (2007)","DOI":"10.1007\/978-3-540-73131-3_3"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1145\/361227.361230","volume":"18","author":"J.B. Goodenough","year":"1975","unstructured":"Goodenough, J.B.: Exception Handling: Issues and a Proposed Notation. Commun. ACM\u00a018, 683\u2013696 (1975)","journal-title":"Commun. ACM"},{"key":"16_CR4","unstructured":"Parnas, D.L., W\u00fcrges, H.: Response to undesired events in software systems. In: International Conference on Software Engineering, pp. 437\u2013446 (1976)"},{"key":"16_CR5","unstructured":"Reh\u00e1k, M., To\u017ei\u010dka, J., P\u011bchou\u010dek, M., \u017delezn\u00fd, F., Rollo, M.: An abstract architecture for computational reflection in multi-agent systems. In: Intelligent Agent Technology, 2005 IEEE\/WIC\/ACM International Conference. Number PR2416 IEEE, Los Alamitos (2005)"},{"key":"16_CR6","unstructured":"Unified Modeling Language Specification, UML version 2.0 (August 2005) (Accessed in December 2006), http:\/\/www.omg.org\/docs\/formal\/05-07-04.pdf"},{"key":"16_CR7","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers Univ. (2000)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Parekh, J., Gross, P.N., Kaiser, G., Misra, V., Nieh, J., Rubenstein, D., Stolfo, S.J.: A Holistic Approach to Service Survivability. In: Workshop on Survivable and Self-Regenerative Systems (SSRS), pp. 11\u201322 (2003)","DOI":"10.1145\/1036921.1036923"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Reh\u00e1k, M., P\u011bchou\u010dek, M., Prokopov\u00e1, M., Folt\u00fdn, L., To\u017ei\u010dka, J.: Autonomous protection mechanism for joint networks in coalition operations. In: Knowledge Systems for Coalition Operations 2007, Proceedings of KIMAS 2007 (2007)","DOI":"10.1109\/KIMAS.2007.369840"},{"key":"16_CR10","volume-title":"Network Intrusion Detection: An Analyst\u2019s Handbook","author":"S. Northcutt","year":"2002","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection: An Analyst\u2019s Handbook. New Riders Publishing, Thousand Oaks, CA (2002)"},{"key":"16_CR11","unstructured":"Dellarocas, C.: Toward Exception Handling Infrastructures in Component-based Software. In: Proceedings of the International Workshop on Component-based Software Engineering (1998)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Issarny, V.: Ban\u00e2tre, J.P.: Architecture-based Exception Handling. In: Hawaii International Conference on System Sciences (2001)","DOI":"10.1109\/HICSS.2001.927253"},{"key":"16_CR13","unstructured":"IETF Intrusion Detection Exchange Format Working Group (2007) (Accessed in January 2007), http:\/\/www.ietf.org\/ids.by.wg\/idwg.html"},{"key":"16_CR14","unstructured":"IETF Intrusion Detection Message Exchange Format (2007) (Accessed in January 2007), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-idwg-idmef-xml-16.txt"},{"key":"16_CR15","unstructured":"IETF Intrusion Detection Exchange Protocol (2007) (Accessed in January 2007), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-idwg-beep-idxp-07.txt"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","first-page":"613","volume-title":"Database and Expert Systems Applications","author":"F.P. Maturana","year":"2002","unstructured":"Maturana, F.P., Tich\u00fd, P., Staron, R.J., Slechta, P.: Using dynamically created decision-making organizations (holarchies) to plan, commit, and execute control tasks in a chilled water system. In: Hameurlain, A., Cicchetti, R., Traunm\u00fcller, R. (eds.) DEXA 2002. LNCS, vol.\u00a02453, pp. 613\u2013622. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Holonic and Multi-Agent Systems for Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74481-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:44:13Z","timestamp":1683999853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74481-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744788","9783540744818"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74481-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}