{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:40Z","timestamp":1725494380237},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766261"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76627-8_6","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T15:44:09Z","timestamp":1194277449000},"page":"37-51","source":"Crossref","is-referenced-by-count":4,"title":["Decentralized Detector Generation in Cooperative Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Rainer","family":"Bye","sequence":"first","affiliation":[]},{"given":"Katja","family":"Luther","sequence":"additional","affiliation":[]},{"given":"Seyit Ahmet","family":"\u00c7amtepe","sequence":"additional","affiliation":[]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[]},{"given":"\u015eahin","family":"Albayrak","sequence":"additional","affiliation":[]},{"given":"B\u00fclent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Kim, J., Bentley, P.: The artificial immune model for network intrusion detection. In: EUFIT. 7th European Conference on Intelligent Techniques and Soft Computing (1999)"},{"key":"6_CR2","unstructured":"Gonzalez, F., Dasgupta, D.: Anomaly detection using using real-valued negative selection. In: Genetic Programming and Evolvable Machines (2003)"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1002\/cplx.20004","volume":"9","author":"S. Goel","year":"2003","unstructured":"Goel, S., Bush, S.F.: Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: a comparison with traditional approaches. Complexity\u00a09(2), 54\u201373 (2003)","journal-title":"Complexity"},{"key":"6_CR4","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P. Erd\u0151s","year":"1959","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On random graphs. Publ. Math. Debrecen\u00a06, 290\u2013297 (1959)","journal-title":"Publ. Math. Debrecen"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"H.W. Hethcote","year":"2000","unstructured":"Hethcote, H.W.: The mathematics of infectious diseases. SIAM Review\u00a042(4), 599\u2013653 (2000)","journal-title":"SIAM Review"},{"key":"6_CR6","first-page":"202","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself Discrimination in a Computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/SECPRI.1996.502675","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation Journal\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation Journal"},{"key":"6_CR9","volume-title":"IEEE International Conference on Communications","author":"K. Luther","year":"2007","unstructured":"Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative ais framework for intrusion detection. In: IEEE International Conference on Communications, IEEE Computer Society Press, Los Alamitos (2007)"},{"issue":"4","key":"6_CR10","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S. Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys\u00a036(4), 335\u2013371 (2004)","journal-title":"ACM Computing Surveys"},{"key":"6_CR11","unstructured":"Anderson, I.: Combinatorial designs: construction methods. Ellis Horwood Limited (1990)"},{"key":"6_CR12","volume-title":"Combinatorial designs: construction and analysis","author":"D.R. Stinson","year":"2004","unstructured":"Stinson, D.R.: Combinatorial designs: construction and analysis. Springer, Heidelberg (2004)"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"S.A. Camtepe","year":"2007","unstructured":"Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Transactions on Networking\u00a015(2), 346\u2013358 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"6_CR14","unstructured":"Linial, N., Wigderson, A.: Expander graphs and their applications. Lecture Notes, Hebrew University, Israel (January 2003)"},{"key":"6_CR15","unstructured":"Linial, N.: Expanders, eigenvalues and all that. In: NIPS 2004 Talk (2004)"},{"key":"6_CR16","unstructured":"Govindaraju, R.: Design of Scalable Expander Interconnection Networks. PhD thesis, Rensselaer Polytechnic Institute, Troy, New York 12180, USA (1994)"},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/BF02126799","volume":"8","author":"A. Lubotzky","year":"1988","unstructured":"Lubotzky, A., Phillips, R., Sarnak, P.: Ramanujan graphs. Combinatorica\u00a08(3), 261\u2013277 (1988)","journal-title":"Combinatorica"},{"key":"6_CR18","volume-title":"IEEE International Conference on Communications","author":"S.A. Camtepe","year":"2006","unstructured":"Camtepe, S.A., Yener, B., Yung, M.: Expander graph based key distribution mechanisms in wireless sensor networks. In: IEEE International Conference on Communications, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/B:WINE.0000013081.09837.c0","volume":"10","author":"F. Xue","year":"2004","unstructured":"Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wireless Networks\u00a010, 169\u2013181 (2004)","journal-title":"Wireless Networks"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Draief, M., Ganesh, A., Massouli\u00e9, L.: Thresholds for virus spread on networks. In: 1st International Conference on Performance Evaluation Methodolgies and Tools, p.\u00a051 (2006)","DOI":"10.1145\/1190095.1190160"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: 22nd Symposium on Reliable Distributed Computing (2003)","DOI":"10.1109\/RELDIS.2003.1238052"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76627-8_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T16:29:02Z","timestamp":1684081742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76627-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540766261"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76627-8_6","relation":{},"subject":[]}}