{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:54Z","timestamp":1725538314043},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_10","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T01:52:07Z","timestamp":1253929927000},"page":"77-84","source":"Crossref","is-referenced-by-count":1,"title":["An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages"],"prefix":"10.1007","author":[{"given":"Cristian I.","family":"Pinz\u00f3n","sequence":"first","affiliation":[]},{"given":"Juan F.","family":"De Paz","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Bajo","sequence":"additional","affiliation":[]},{"given":"Juan M.","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"OASIS: Web Services Security: SOAP Message Security 1.1 (WS-Security 2004), OASIS Standard 2004, http:\/\/docs.oasis-open.org\/wss\/2004\/01\/oasis-200401-wss-soap-message-security-1.0.pdf (2006)"},{"key":"10_CR2","unstructured":"Bajaj, et al.: Web Services Policy Framework, WS-Policy (2004), http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-polfram"},{"key":"10_CR3","unstructured":"Web Services Trust Language (WS-Trust), http:\/\/specs.xmlsoap.org\/ws\/2005\/02\/trust\/WS-Trust.pdf"},{"key":"10_CR4","unstructured":"Web Services Secure Conversation Language (WS-SecureConversation), http:\/\/specs.xmlsoap.org\/ws\/2005\/02\/sc\/WS-SecureConversation.pdf"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Luttenberger, N.: Protecting Web Services from DoS Attacks by SOAP Message Validation. Security and Privacy in Dynamic Environments\u00a0(201), 171\u2013182 (2006)","DOI":"10.1007\/0-387-33406-8_15"},{"key":"10_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-25945-9_10","volume-title":"Current Topics in Artificial Intelligence","author":"R. Laza","year":"2004","unstructured":"Laza, R., Pavon, R., Corchado, J.M.: A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System. In: Conejo, R., Urretavizcaya, M., P\u00e9rez-de-la-Cruz, J.-L. (eds.) CAEPIA\/TTIA 2003. LNCS (LNAI), vol.\u00a03040, pp. 96\u2013106. Springer, Heidelberg (2004)"},{"key":"10_CR7","volume-title":"WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More","author":"S. Weerawarana","year":"2005","unstructured":"Weerawarana, S., Curbera, F., Leymann, F., Storey, T., Ferguson, D.F.: Web Services Platform Architecture: SOAP. In: WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, Englewood Cliffs (2005)"},{"key":"10_CR8","first-page":"1147","volume":"2","author":"Y. Loh","year":"2006","unstructured":"Loh, Y., Yau, W., Wong, C., Ho, W.: Design and Implementation of an XML Firewall. Computational Intelligence and Security\u00a02, 1147\u20131150 (2006)","journal-title":"Computational Intelligence and Security"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/ICCIT.2007.422","volume-title":"International Conference on Convergence Information Technology","author":"G. Yee","year":"2007","unstructured":"Yee, G., Shin, H., Rao, G.S.V.R.K.: An Adaptive Intrusion Detection and Prevention (ID\/IP) Framework for Web Services. In: International Conference on Convergence Information Technology, pp. 528\u2013534. IEEE Computer Society, Washington (2007)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger, N.: SOA and Web Services: New Technologies, New Standards - New Attacks. In: Fifth European Conference on Web Services-ECOWS 2007, pp. 35\u201344 (2007)","DOI":"10.1109\/ECOWS.2007.9"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Dagdee, N., Thakar, U.: Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots. In: First International Conference Emerging Trends in Engineering and Technology, pp. 1232\u20131237 (2008)","DOI":"10.1109\/ICETET.2008.192"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.eswa.2006.08.031","volume":"34","author":"C. Carrascosa","year":"2008","unstructured":"Carrascosa, C., Bajo, J., Julian, V., Corchado, J.M., Botti, V.: Hybrid multiagent architecture as a real-time problem-solving model. Expert Syst. Appl.\u00a034, 2\u201317 (2008)","journal-title":"Expert Syst. Appl."},{"key":"10_CR13","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MIS.2008.27","volume":"23","author":"J.M. Corchado","year":"2008","unstructured":"Corchado, J.M., Bajo, J., Abraham, A.: GerAmi: Improving Healthcare Delivery in Geriatric Residences. IEEE Intelligent Systems\u00a023, 19\u201325 (2008)","journal-title":"IEEE Intelligent Systems"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T17:29:41Z","timestamp":1558546181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_10","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}