{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:26:51Z","timestamp":1761708411003},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_14","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T01:52:07Z","timestamp":1253929927000},"page":"109-116","source":"Crossref","is-referenced-by-count":9,"title":["Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention"],"prefix":"10.1007","author":[{"given":"Gustavo","family":"Isaza","sequence":"first","affiliation":[]},{"given":"Andr\u00e9s","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Castillo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"2","volume-title":"Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems","author":"J. Undercoffer","year":"2005","unstructured":"Undercoffer, J., Finin, T., Joshi, A., Pinkston, J.: A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors. In: Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems, pp. 2\u201322. Cambridge University Press, Cambridge (2005)"},{"key":"14_CR2","unstructured":"Mandujano, S., Galvan, A., Nolazco, J.: An ontology-based multiagent approach to outbound intrusion detection. In: The 3rd ACS\/IEEE International Conference on Computer Systems and Applications, p. 94 (2005)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-540-39718-2_22","volume-title":"The Semantic Web - ISWC 2003","author":"G. Denker","year":"2003","unstructured":"Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.: Security for DAML web services: Annotation and matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 335\u2013350. Springer, Heidelberg (2003)"},{"issue":"5","key":"14_CR4","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.cose.2005.01.004","volume":"24","author":"D. Dasgupta","year":"2005","unstructured":"Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J., et al.: CIDS: An agent-based intrusion detection system. Computer and Security: Science Direct\u00a024(5), 387\u2013398 (2005)","journal-title":"Computer and Security: Science Direct"},{"key":"14_CR5","first-page":"320","volume-title":"Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems","author":"A. Herrero","year":"2008","unstructured":"Herrero, A., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems, pp. 320\u2013328. Springer, Heidelberg (2008)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Golovko, V., Kachurka, P., Vaitsekhovich, L.: Neural Network Ensembles for Intrusion Detection. In: 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IDAACS 2007, pp. 578\u2013583 (2007)","DOI":"10.1109\/IDAACS.2007.4488487"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning intrusion detection: Supervised or unsupervised? In: 13th International Conference on Image Analysis and Processing - ICIAP, Cagliari, Italy, pp. 50\u201357 (2005)","DOI":"10.1007\/11553595_6"},{"key":"14_CR8","volume-title":"Proceedings of the First International Conference on Innovative Computing, Information and Control","author":"K. Li","year":"2006","unstructured":"Li, K., Teng, G.: Unsupervised SVM Based on p-kernels for Anomaly Detection. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, vol.\u00a02. IEEE Computer Society, Los Alamitos (2006)"},{"key":"14_CR9","unstructured":"Zurutuza, U., Uribeetxeberria, R., Azketa, E., Gil, G., et al.: Combined Data Mining Approach for Intrusion Detection. In: International Conference on Security and Criptography, Barcelona, Spain (2008)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Al-Mamory, S., Zhang, H.: Intrusion detection alarms reduction using root cause analysis and clustering, pp. 419\u2013430. Butterworth-Heinemann (2009)","DOI":"10.1016\/j.comcom.2008.11.012"},{"key":"14_CR11","first-page":"802","volume-title":"A clustering-based method for unsupervised intrusion detections","author":"S. Jiang","year":"2006","unstructured":"Jiang, S., Song, X., Wang, H., Han, J., et al.: A clustering-based method for unsupervised intrusion detections, pp. 802\u2013810. Elsevier Science Inc., Amsterdam (2006)"},{"key":"14_CR12","unstructured":"IETF-IDMEF. he Intrusion Detection Message Exchange Format (IDMEF). Consulted (2008), http:\/\/www.ietf.org\/rfc\/rfc4765.txt (2007)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1017\/CBO9780511711787.016","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"I. Horrocks","year":"2007","unstructured":"Horrocks, I., Patel-Schneider, P., McGuinness, D.: OWL: a Description Logic Based Ontology Language for the Semantic Web. In: Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.) The Description Logic Handbook: Theory, Implementation and Applications, 2nd edn., pp. 458\u2013486. Cambridge University Press, Cambridge (2007)","edition":"2"},{"key":"14_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-32253-5_9","volume-title":"Law and the Semantic Web","author":"\u00d3. Corcho","year":"2005","unstructured":"Corcho, \u00d3., Fern\u00e1ndez-L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A., L\u00f3pez-Cima, A.: Building legal ontologies with METHONTOLOGY and webODE. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS (LNAI), vol.\u00a03369, pp. 142\u2013157. Springer, Heidelberg (2005)"},{"key":"14_CR15","unstructured":"DARPA. DARPA Intrusion Detection Evaluation, The, DARPA off-line intrusion detection evaluation. LINCOLN LABORATORY Massachusetts Institute of Technology. Consulted (2008), http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1999\/1999_data_index.html (1999)"},{"key":"14_CR16","first-page":"237","volume-title":"PAAMS 2009","author":"G. Isaza","year":"2009","unstructured":"Isaza, G., Castillo, A., Duque, N.: An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies in Advances in Intelligence and Soft Computing. In: Demazeau, Y., et al. (eds.) PAAMS 2009, pp. 237\u2013245. Springer, Heidelberg (2009)"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:00Z","timestamp":1606167540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_14","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}