{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:30:29Z","timestamp":1742931029137,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214837"},{"type":"electronic","value":"9783642214844"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21484-4_22","type":"book-chapter","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T06:43:37Z","timestamp":1308638617000},"page":"177-180","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems"],"prefix":"10.1007","author":[{"given":"Shahriar","family":"Bijani","sequence":"first","affiliation":[]},{"given":"David","family":"Robertson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance: a cautionary note. In: Proc. of USENIX Workshop on Electronic Commerce, vol.\u00a02, pp. 1\u201311 (1996)"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1459010.1459011","volume":"10","author":"A. Artikis","year":"2009","unstructured":"Artikis, A., Sergot, M., Pitt, J.: Specifying norm-governed computational societies. ACM Tran. on Computational Logic (TOCL)\u00a010, 1\u201342 (2009)","journal-title":"ACM Tran. on Computational Logic (TOCL)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Becker, M.Y.: Information Flow in Credential Systems. In: IEEE Computer Security Foundations Symposium (CSF), pp. 171\u2013185 (2010)","DOI":"10.1109\/CSF.2010.19"},{"key":"22_CR4","unstructured":"Esteva, M., et al.: Engineering open multi-agent systems as electronic institutions. In: Proc. of the National Conference on Artificial Intelligence (1999)"},{"key":"22_CR5","unstructured":"Poslad, S., Calisti, M.: Towards improved trust and security in FIPA agent platforms. In: Workshop on Deception, Fraud and Trust in Agent Societies (2000)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-27775-0_29","volume-title":"Logic Programming","author":"D. Robertson","year":"2004","unstructured":"Robertson, D.: Multi-agent coordination as distributed logic programming. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol.\u00a03132, pp. 416\u2013430. Springer, Heidelberg (2004)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"S. Robles Trust and Security. Issues in Multi-Agent Systems: the AgentCities. ES Experience, Basel (2008)","DOI":"10.1007\/978-3-7643-8543-9_4"}],"container-title":["Lecture Notes in Computer Science","Managing the Dynamics of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21484-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T23:00:45Z","timestamp":1560294045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21484-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214837","9783642214844"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21484-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}